Suchen und Finden
Contents
5
1 Introduction
8
1.1 Internet of Things
8
1.2 RFID Technologies
8
1.3 Tag Search Problem
9
1.4 Anonymous RFID Authentication
10
1.5 Identification of Networked Tags
11
1.6 Outline of the Book
12
References
12
2 Efficient Tag Search in Large RFID Systems
15
2.1 System Model and Problem Statement
15
2.1.1 System Model
15
2.1.2 Time Slots
16
2.1.3 Problem Statement
16
2.2 Related Work
17
2.2.1 Tag Identification
17
2.2.2 Polling Protocol
19
2.2.3 CATS Protocol
19
2.3 A Fast Tag Search Protocol Based on Filtering Vectors
20
2.3.1 Motivation
20
2.3.2 Bloom Filter
21
2.3.3 Filtering Vectors
21
2.3.4 Iterative Use of Filtering Vectors
23
2.3.5 Generalized Approach
24
2.3.6 Values of mi
25
2.3.7 Iterative Tag Search Protocol
28
2.3.7.1 Phase One
28
2.3.7.2 Phase Two
28
2.3.8 Cardinality Estimation
29
2.3.9 Additional Filtering Vectors
30
2.3.10 Hardware Requirement
30
2.4 ITSP over Noisy Channel
31
2.4.1 ITSP with Noise on Forward Link
31
2.4.2 ITSP with Noise on Reverse Link
32
2.4.2.1 ITSP Under Random Error Model (ITSP-rem)
33
2.4.2.2 ITSP Under Burst Error Model (ITSP-bem)
33
2.5 Performance Evaluation
35
2.5.1 Performance Metric
35
2.5.2 Performance Comparison
35
2.5.3 False -Positive Ratio
37
2.5.4 Performance Evaluation Under Channel Error
38
2.5.4.1 Performance of ITSP-rem and ITSP-bem
38
2.5.4.2 False-Positive Ratio of ITSP-rem and ITSP-bem
40
2.5.4.3 Signal Loss Due to Fading Channel
42
2.6 Summary
43
References
43
3 Lightweight Anonymous RFID Authentication
45
3.1 System Model and Security Model
45
3.1.1 System Model
45
3.1.2 Security Model
46
3.2 Related Work
48
3.2.1 Non-tree-Based Protocols
48
3.2.2 Tree-Based Protocols
49
3.3 A Strawman Solution
49
3.3.1 Motivation
49
3.3.2 A Strawman Solution
50
3.4 Dynamic Token-Based Authentication Protocol
51
3.4.1 Motivation
51
3.4.2 Overview
52
3.4.3 Initialization Phase
52
3.4.4 Authentication Phase
53
3.4.5 Updating Phase
53
3.4.6 Randomness Analysis
55
3.4.7 Discussion
58
3.4.8 Potential Problems of TAP
59
3.5 Enhanced Dynamic Token-Based Authentication Protocol
59
3.5.1 Resistance Against Desynchronization and Replay Attacks
59
3.5.2 Resolving Hash Collisions
61
3.5.3 Discussion
64
3.6 Security Analysis
65
3.7 Numerical Results
66
3.7.1 Effectiveness of Multi-Hash Scheme
66
3.7.2 Token-Level Randomness
67
3.7.3 Bit-Level Randomness
67
3.8 Summary
70
References
70
4 Identifying State-Free Networked Tags
72
4.1 System Model and Problem Statement
72
4.1.1 Networked Tag System
72
4.1.2 Problem Statement
73
4.1.3 State-Free Networked Tags
73
4.1.4 System Model
74
4.2 Related Work
75
4.3 Contention-Based ID Collection Protocol for Networked Tag Systems
76
4.3.1 Motivation
76
4.3.2 Request Broadcast Protocol
77
4.3.3 ID Collection Protocol
79
4.4 Serialized ID Collection Protocol
80
4.4.1 Motivation
80
4.4.2 Overview
80
4.4.3 Biased Energy Consumption
81
4.4.4 Serial Numbers
82
4.4.5 Parent Selection
83
4.4.6 Serialization at Tier Two
84
4.4.7 Recursive Serialization
85
4.4.8 Frame Size
87
4.4.9 Load Factor Per Tag
88
4.5 Improving Time Efficiency of SICP
90
4.5.1 Request Aggregation
90
4.5.2 ID-Transmission Pipelining
91
4.6 Evaluation
94
4.6.1 Simulation Setup
94
4.6.2 Children Degree and Load Factor
95
4.6.3 Performance Comparison
96
4.6.4 Performance Tradeoff for SICP and p-SICP
97
4.6.5 Time-Efficiency Comparison of SCIP and p-SICP
98
4.7 Summary
98
References
100
Alle Preise verstehen sich inklusive der gesetzlichen MwSt.