Skip to main content

2016 | Buch

RFID Technologies for Internet of Things

insite
SUCHEN

Über dieses Buch

This book introduces applications of RFID on the Internet of things, under the emerging technologies for tag search, anonymous RFID authentication, and identification of networked tags. A new technique called filtering vector (a compact data structure that encodes tag IDs) is proposed to enable tag filtration, meeting the stringent delay requirements for real-world applications. Based on filtering vectors, a novel iterative tag search protocol is designed, which progressively improves the accuracy of search result and reduces the time of each iteration by using the information learned from the previous iterations. Moreover, the protocol is extended to work under noisy channel.
The authors also make a fundamental shift from the traditional design paradigm for anonymous RFID authentication by following an asymmetry design principle that pushes most complexity to the readers while leaving the tags as simple as possible. A novel technique is developed to dynamically generate random tokens on demand for authentication. The token-based authentication protocol only requires O(1) communication overhead and online computation overhead per authentication for both readers and tags.
Finally, the authors investigate the problem of networked-tag identification. The traditional contention-based protocol design will incur too much energy overhead in multihop tag systems, and a reader-coordinated design that significantly serializes tag transmissions performs much better. In addition, a solution based on serial numbers is proposed to achieve load balancing, thereby reducing the worst-case energy cost among the tags.
Designed for researchers and professionals, this SpringerBrief will interest individuals who work in efficiency, security, and privacy. Advanced-level students focused on network design will also benefit from the content.

Inhaltsverzeichnis

Frontmatter
Chapter 1. Introduction
Abstract
Internet of Things (IoT) is a new networking paradigm for cyber-physical systems that allow physical objects to collect and exchange data. Generally, every physical object in the IoT needs to be uniquely identified by some auto-ID technologies. Radio Frequency Identification (RFID) tags have been widely used as object identifiers for IoT. The widespread use of RFID tags in IoT brings about new issues on efficiency, security, and privacy, which in turn opens up new research opportunities. This book presents several RFID protocols that are designed to improve the efficiency, security, and privacy of the IoT.
Min Chen, Shigang Chen
Chapter 2. Efficient Tag Search in Large RFID Systems
Abstract
This chapter introduces the tag search problem in large RFID systems. A new technique called filtering vector is designed to reduce the transmission overhead during search process, thereby improving the time efficiency. Based on this technique, we present an iterative tag search protocol. Some tags are filtered out in each round and the search process will eventually terminate when the result meets a given accuracy requirement. Moreover, the protocol is extended to work under noisy channel. The simulation results demonstrate that our protocol performs much better than the best existing work.
Min Chen, Shigang Chen
Chapter 3. Lightweight Anonymous RFID Authentication
Abstract
This chapter describes on lightweight RFID anonymous authentication. The widespread use of RFID tags raises a privacy concern: They make their carriers trackable. To protect the privacy of the tag carriers, we need to invent new mechanisms that keep the usefulness of tags while doing so anonymously. Many tag applications such as toll payment require authentication. Since low-cost tags have extremely limited hardware resource, an asymmetric design principle is adopted to push most complexity to more powerful RFID readers. Instead of implementing complicated and hardware-intensive cryptographic hash functions, our authentication protocol only requires tags to perform several simple and hardware-efficient operations to generate dynamic tokens for anonymous authentication. The theoretic analysis and randomness tests demonstrate that our protocol can ensure the privacy of the tags. Moreover, our protocol reduces the communication overhead and online computation overhead to O(1) per authentication for both tags and readers, which compares favorably with the prior art.
Min Chen, Shigang Chen
Chapter 4. Identifying State-Free Networked Tags
Abstract
Traditional RFID technologies allow tags to communicate with a reader but not among themselves. By enabling peer communications between nearby tags, the emerging networked tags represent a significant enhancement to today’s RFID tags. They support applications in previously infeasible scenarios where the readers cannot cover all tags due to cost or physical limitations. This chapter introduces a fundamental problem of identifying networked tags. To prolong the lifetime of networked tags and make identification protocols scalable to large systems, energy efficiency and time efficiency are most critical. We reveal that the traditional contention-based protocol design will incur too much energy overhead in multihop tag systems, while a reader-coordinated design that significantly serializes tag transmissions performs much better. In addition, we show that load balancing is important in reducing the worst-case energy cost to the tags, and we present a solution based on serial numbers.
Min Chen, Shigang Chen
Metadaten
Titel
RFID Technologies for Internet of Things
verfasst von
Min Chen
Shigang Chen
Copyright-Jahr
2016
Electronic ISBN
978-3-319-47355-0
Print ISBN
978-3-319-47354-3
DOI
https://doi.org/10.1007/978-3-319-47355-0