RFID Technologies for Internet of Things

von: Min Chen, Shigang Chen

Springer-Verlag, 2016

ISBN: 9783319473550 , 100 Seiten

Format: PDF, OL

Kopierschutz: Wasserzeichen

Windows PC,Mac OSX geeignet für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Online-Lesen für: Windows PC,Mac OSX,Linux

Preis: 106,99 EUR

Mehr zum Inhalt

RFID Technologies for Internet of Things


 

Contents

5

1 Introduction

8

1.1 Internet of Things

8

1.2 RFID Technologies

8

1.3 Tag Search Problem

9

1.4 Anonymous RFID Authentication

10

1.5 Identification of Networked Tags

11

1.6 Outline of the Book

12

References

12

2 Efficient Tag Search in Large RFID Systems

15

2.1 System Model and Problem Statement

15

2.1.1 System Model

15

2.1.2 Time Slots

16

2.1.3 Problem Statement

16

2.2 Related Work

17

2.2.1 Tag Identification

17

2.2.2 Polling Protocol

19

2.2.3 CATS Protocol

19

2.3 A Fast Tag Search Protocol Based on Filtering Vectors

20

2.3.1 Motivation

20

2.3.2 Bloom Filter

21

2.3.3 Filtering Vectors

21

2.3.4 Iterative Use of Filtering Vectors

23

2.3.5 Generalized Approach

24

2.3.6 Values of mi

25

2.3.7 Iterative Tag Search Protocol

28

2.3.7.1 Phase One

28

2.3.7.2 Phase Two

28

2.3.8 Cardinality Estimation

29

2.3.9 Additional Filtering Vectors

30

2.3.10 Hardware Requirement

30

2.4 ITSP over Noisy Channel

31

2.4.1 ITSP with Noise on Forward Link

31

2.4.2 ITSP with Noise on Reverse Link

32

2.4.2.1 ITSP Under Random Error Model (ITSP-rem)

33

2.4.2.2 ITSP Under Burst Error Model (ITSP-bem)

33

2.5 Performance Evaluation

35

2.5.1 Performance Metric

35

2.5.2 Performance Comparison

35

2.5.3 False -Positive Ratio

37

2.5.4 Performance Evaluation Under Channel Error

38

2.5.4.1 Performance of ITSP-rem and ITSP-bem

38

2.5.4.2 False-Positive Ratio of ITSP-rem and ITSP-bem

40

2.5.4.3 Signal Loss Due to Fading Channel

42

2.6 Summary

43

References

43

3 Lightweight Anonymous RFID Authentication

45

3.1 System Model and Security Model

45

3.1.1 System Model

45

3.1.2 Security Model

46

3.2 Related Work

48

3.2.1 Non-tree-Based Protocols

48

3.2.2 Tree-Based Protocols

49

3.3 A Strawman Solution

49

3.3.1 Motivation

49

3.3.2 A Strawman Solution

50

3.4 Dynamic Token-Based Authentication Protocol

51

3.4.1 Motivation

51

3.4.2 Overview

52

3.4.3 Initialization Phase

52

3.4.4 Authentication Phase

53

3.4.5 Updating Phase

53

3.4.6 Randomness Analysis

55

3.4.7 Discussion

58

3.4.8 Potential Problems of TAP

59

3.5 Enhanced Dynamic Token-Based Authentication Protocol

59

3.5.1 Resistance Against Desynchronization and Replay Attacks

59

3.5.2 Resolving Hash Collisions

61

3.5.3 Discussion

64

3.6 Security Analysis

65

3.7 Numerical Results

66

3.7.1 Effectiveness of Multi-Hash Scheme

66

3.7.2 Token-Level Randomness

67

3.7.3 Bit-Level Randomness

67

3.8 Summary

70

References

70

4 Identifying State-Free Networked Tags

72

4.1 System Model and Problem Statement

72

4.1.1 Networked Tag System

72

4.1.2 Problem Statement

73

4.1.3 State-Free Networked Tags

73

4.1.4 System Model

74

4.2 Related Work

75

4.3 Contention-Based ID Collection Protocol for Networked Tag Systems

76

4.3.1 Motivation

76

4.3.2 Request Broadcast Protocol

77

4.3.3 ID Collection Protocol

79

4.4 Serialized ID Collection Protocol

80

4.4.1 Motivation

80

4.4.2 Overview

80

4.4.3 Biased Energy Consumption

81

4.4.4 Serial Numbers

82

4.4.5 Parent Selection

83

4.4.6 Serialization at Tier Two

84

4.4.7 Recursive Serialization

85

4.4.8 Frame Size

87

4.4.9 Load Factor Per Tag

88

4.5 Improving Time Efficiency of SICP

90

4.5.1 Request Aggregation

90

4.5.2 ID-Transmission Pipelining

91

4.6 Evaluation

94

4.6.1 Simulation Setup

94

4.6.2 Children Degree and Load Factor

95

4.6.3 Performance Comparison

96

4.6.4 Performance Tradeoff for SICP and p-SICP

97

4.6.5 Time-Efficiency Comparison of SCIP and p-SICP

98

4.7 Summary

98

References

100