RFID Technologies for Internet of Things
β Scribed by Min Chen, Shigang Chen (auth.)
- Publisher
- Springer International Publishing
- Year
- 2016
- Tongue
- English
- Leaves
- 100
- Series
- Wireless Networks
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book introduces applications of RFID on the Internet of things, under the emerging technologies for tag search, anonymous RFID authentication, and identification of networked tags. A new technique called filtering vector (a compact data structure that encodes tag IDs) is proposed to enable tag filtration, meeting the stringent delay requirements for real-world applications. Based on filtering vectors, a novel iterative tag search protocol is designed, which progressively improves the accuracy of search result and reduces the time of each iteration by using the information learned from the previous iterations. Moreover, the protocol is extended to work under noisy channel.
The authors also make a fundamental shift from the traditional design paradigm for anonymous RFID authentication by following an asymmetry design principle that pushes most complexity to the readers while leaving the tags as simple as possible. A novel technique is developed to dynamically generate random tokens on demand for authentication. The token-based authentication protocol only requires O(1) communication overhead and online computation overhead per authentication for both readers and tags.
Finally, the authors investigate the problem of networked-tag identification. The traditional contention-based protocol design will incur too much energy overhead in multihop tag systems, and a reader-coordinated design that significantly serializes tag transmissions performs much better. In addition, a solution based on serial numbers is proposed to achieve load balancing, thereby reducing the worst-case energy cost among the tags.
Designed for researchers and professionals, this SpringerBrief will interest individuals who work in efficiency, security, and privacy. Advanced-level students focused on network design will also benefit from the content.
β¦ Table of Contents
Front Matter....Pages i-vii
Introduction....Pages 1-7
Efficient Tag Search in Large RFID Systems....Pages 9-38
Lightweight Anonymous RFID Authentication....Pages 39-65
Identifying State-Free Networked Tags....Pages 67-95
β¦ Subjects
Information Systems Applications (incl. Internet);Communications Engineering, Networks;Computer Communication Networks
π SIMILAR VOLUMES
RFID (Radio Frequency Identification) technology allows for automatic identification of information contained in a tag by scanning and interrogation using radio frequency (RF) waves. An RFID tag contains an antenna and a microchip that allows it to transmit and receive. This technology is a possibl
RFID (Radio Frequency Identification) technology allows for automatic identification of information contained in a tag by scanning and interrogation using radio frequency (RF) waves.<br>An RFID tag contains an antenna and a microchip that allows it to transmit and receive. This technology is a possi
<p>This book focuses on recent advances in the Internet of Things (IoT) in biomedical and healthcare technologies, presenting theoretical, methodological, well-established, and validated empirical work in these fields. Artificial intelligence and IoT are set to revolutionize all industries, but perh
<p><span>Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. RFIDs have been widely used in countless applications such as object tracking, 3D positioning, indoor localizat