Understanding RFID Counting Protocols

被引:45
|
作者
Zhou, Ziling [1 ]
Chen, Binbin [2 ]
Yu, Haifeng [1 ]
机构
[1] Natl Univ Singapore, Sch Comp, Dept Comp Sci, Singapore 117418, Singapore
[2] Adv Digital Sci Ctr, Singapore 138632, Singapore
基金
新加坡国家研究基金会;
关键词
Lower bounds; RFID counting protocols; two-phase;
D O I
10.1109/TNET.2014.2361149
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Counting the number of radio frequency identification (RFID) tags, namely RFID counting, is needed by a wide array of important wireless applications. Motivated by its paramount practical importance, researchers have developed an impressive arsenal of techniques to improve the performance of RFID counting (i. e., to reduce the time needed to do the counting). This paper aims to gain deeper and fundamental insights in this subject to facilitate future research on this topic. As our central thesis, we find out that the overlooked key design aspect for RFID counting protocols to achieve near-optimal performance is a conceptual separation of a protocol into two phases. The first phase uses small overhead to obtain a rough estimate, and the second phase uses the rough estimate to further achieve an accuracy target. Our thesis also indicates that other performance-enhancing techniques or ideas proposed in the literature are only of secondary importance. Guided by our central thesis, we manage to design near-optimal protocols that are more efficient than existing ones and simultaneously simpler than most of them.
引用
收藏
页码:312 / 327
页数:16
相关论文
共 50 条
  • [1] Counting with Population Protocols
    Mocquard, Yves
    Anceaume, Emmanuelle
    Aspnes, James
    Busnel, Yann
    Sericola, Bruno
    [J]. 2015 IEEE 14TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2015, : 35 - 42
  • [2] Untraceability of RFID protocols
    van Deursen, Ton
    Mauw, Sjouke
    Radomirovic, Sasa
    [J]. INFORMATION SECURITY THEORY AND PRACTICES: SMART DEVICES, CONVERGENCE AND NEXT GENERATION NETWORKS, 2008, 5019 : 1 - 15
  • [3] RFID Security Protocols
    Daou, Hoda
    Kayssi, Ayman
    Chehab, Ali
    [J]. IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 233 - 237
  • [4] Efficient RFID Grouping Protocols
    Liu, Jia
    Chen, Min
    Xiao, Bin
    Zhu, Feng
    Chen, Shigang
    Chen, Lijun
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (05) : 3177 - 3190
  • [5] Fast RFID Polling Protocols
    Liu, Jia
    Xiao, Bin
    Liu, Xuan
    Chen, Lijun
    [J]. PROCEEDINGS 45TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING - ICPP 2016, 2016, : 304 - 313
  • [6] A Survey of RFID Authentication Protocols
    Yousuf, Yawer
    Potdar, Vidyasagar
    [J]. 2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1346 - 1350
  • [7] On the Security of RFID Authentication Protocols
    Desai, Nidhi
    Das, Manik Lal
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT), 2015,
  • [8] RFID mutual authentication protocols
    Piramuthu, Selwyn
    [J]. DECISION SUPPORT SYSTEMS, 2011, 50 (02) : 387 - 393
  • [9] Fast RFID Grouping Protocols
    Liu, Jia
    Xiao, Bin
    Chen, Shigang
    Zhu, Feng
    Chen, Lijun
    [J]. 2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [10] Algebraic Attacks on RFID Protocols
    van Deursen, Ton
    Radomirovic, Sasa
    [J]. INFORMATION SECURITY THEORY AND PRACTICE: SMART DEVICES, PERVASIVE SYSTEMS, AND UBIQUITOUS NETWORKS, PROCEEDINGS, 2009, 5746 : 38 - 51