Understanding RFID Counting Protocols

被引:45
|
作者
Zhou, Ziling [1 ]
Chen, Binbin [2 ]
Yu, Haifeng [1 ]
机构
[1] Natl Univ Singapore, Sch Comp, Dept Comp Sci, Singapore 117418, Singapore
[2] Adv Digital Sci Ctr, Singapore 138632, Singapore
基金
新加坡国家研究基金会;
关键词
Lower bounds; RFID counting protocols; two-phase;
D O I
10.1109/TNET.2014.2361149
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Counting the number of radio frequency identification (RFID) tags, namely RFID counting, is needed by a wide array of important wireless applications. Motivated by its paramount practical importance, researchers have developed an impressive arsenal of techniques to improve the performance of RFID counting (i. e., to reduce the time needed to do the counting). This paper aims to gain deeper and fundamental insights in this subject to facilitate future research on this topic. As our central thesis, we find out that the overlooked key design aspect for RFID counting protocols to achieve near-optimal performance is a conceptual separation of a protocol into two phases. The first phase uses small overhead to obtain a rough estimate, and the second phase uses the rough estimate to further achieve an accuracy target. Our thesis also indicates that other performance-enhancing techniques or ideas proposed in the literature are only of secondary importance. Guided by our central thesis, we manage to design near-optimal protocols that are more efficient than existing ones and simultaneously simpler than most of them.
引用
收藏
页码:312 / 327
页数:16
相关论文
共 50 条
  • [41] CHILDRENS UNDERSTANDING OF COUNTING
    WYNN, K
    [J]. COGNITION, 1990, 36 (02) : 155 - 193
  • [42] Lightweight Anonymous Authentication Protocols for RFID Systems
    Chen, Min
    Chen, Shigang
    Fang, Yuguang
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (03) : 1475 - 1488
  • [43] Formal Verification of RFID Protocols Using nuXmv
    Yuan, Guanjie
    Long, Shigong
    [J]. PROCEEDINGS OF 2016 10TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2016, : 58 - 62
  • [44] Single RFID Tag Ownership Transfer Protocols
    Kapoor, Gaurav
    Piramuthu, Selwyn
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2012, 42 (02): : 164 - 173
  • [45] Review of different classes of RFID authentication protocols
    Ibrahim, Alaauldin
    Dalkilic, Gokhan
    [J]. WIRELESS NETWORKS, 2019, 25 (03) : 961 - 974
  • [46] Attacks on CKK family of RFID authentication protocols
    Golebiewski, Zbigniew
    Majcher, Krzysztof
    Zagorski, Filip
    [J]. AD-HOC, MOBILE AND WIRELESS NETWORKS, PROCEEDINGS, 2008, 5198 : 241 - +
  • [47] Scalability and Security Conflict for RFID Authentication Protocols
    Imran Erguler
    Emin Anarim
    [J]. Wireless Personal Communications, 2011, 59 : 43 - 56
  • [48] Universally Composable RFID Identification and Authentication Protocols
    Burmester, Mike
    Van Le, Tri
    De Medeiros, Breno
    Tsudik, Gene
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 12 (04)
  • [49] A Salient Missing Link in RFID Security Protocols
    Imran Erguler
    Emin Anarim
    Gokay Saldamli
    [J]. EURASIP Journal on Wireless Communications and Networking, 2011
  • [50] Untraceability Analysis of Two RFID Authentication Protocols
    Chen Xiuqing
    Cao Tianjie
    Zhai Jingxuan
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2016, 25 (05) : 912 - 920