Understanding RFID Counting Protocols

被引:45
|
作者
Zhou, Ziling [1 ]
Chen, Binbin [2 ]
Yu, Haifeng [1 ]
机构
[1] Natl Univ Singapore, Sch Comp, Dept Comp Sci, Singapore 117418, Singapore
[2] Adv Digital Sci Ctr, Singapore 138632, Singapore
基金
新加坡国家研究基金会;
关键词
Lower bounds; RFID counting protocols; two-phase;
D O I
10.1109/TNET.2014.2361149
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Counting the number of radio frequency identification (RFID) tags, namely RFID counting, is needed by a wide array of important wireless applications. Motivated by its paramount practical importance, researchers have developed an impressive arsenal of techniques to improve the performance of RFID counting (i. e., to reduce the time needed to do the counting). This paper aims to gain deeper and fundamental insights in this subject to facilitate future research on this topic. As our central thesis, we find out that the overlooked key design aspect for RFID counting protocols to achieve near-optimal performance is a conceptual separation of a protocol into two phases. The first phase uses small overhead to obtain a rough estimate, and the second phase uses the rough estimate to further achieve an accuracy target. Our thesis also indicates that other performance-enhancing techniques or ideas proposed in the literature are only of secondary importance. Guided by our central thesis, we manage to design near-optimal protocols that are more efficient than existing ones and simultaneously simpler than most of them.
引用
收藏
页码:312 / 327
页数:16
相关论文
共 50 条
  • [31] Privacy of recent RFID authentication protocols
    Ouafi, Khaled
    Phan, Raphael C. -W.
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2008, 4991 : 263 - +
  • [32] Proper RFID Privacy: Model and Protocols
    Hermans, Jens
    Peeters, Roel
    Preneel, Bart
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (12) : 2888 - 2902
  • [33] A Critical Analysis of RFID Security Protocols
    Sharif, Atif
    Potdar, Vidyasagar
    [J]. 2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1357 - 1362
  • [34] A Survey of RFID Readers Anticollision Protocols
    Mbacke, Abdoul Aziz
    Mitton, Nathalie
    Rivano, Herve
    [J]. IEEE JOURNAL OF RADIO FREQUENCY IDENTIFICATION, 2018, 2 (01): : 38 - 48
  • [35] Protocols for RFID tag/reader authentication
    Piramuthu, Selwyn
    [J]. DECISION SUPPORT SYSTEMS, 2007, 43 (03) : 897 - 914
  • [36] Mutual Authentication Protocols for RFID Systems
    Ashrar A.Omer
    Johnson P.Thomas
    [J]. Machine Intelligence Research, 2008, (04) : 348 - 365
  • [37] Protocols for Objects with Multiple RFID Tags
    Kapoor, Gaurav
    Piramuthu, Selwyn
    [J]. ADCOM: 2008 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2008, : 208 - 213
  • [38] A survey of size counting in population protocols
    Doty, David
    Eftekhari, Mahsa
    [J]. Theoretical Computer Science, 2021, 894 : 91 - 102
  • [39] On the Security of RFID Group Scanning Protocols
    Dang, Duc Nguyen
    Kim, Kwangjo
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (03): : 528 - 530
  • [40] A survey of size counting in population protocols
    Doty, David
    Eftekhari, Mahsa
    [J]. THEORETICAL COMPUTER SCIENCE, 2021, 894 : 91 - 102