RFID as an Infrastructure

RFID (radio frequency identification) tags are becoming ubiquitously available in object tracking, access control, and toll payment. The current application model treats tags simply as ID carriers and deals with each tag individually for the purpose of identifying the object that the tag is attached to. The uniqueness of RFID as an Infrastructure is to change the traditional individual view to a collective view that treats universally-deployed tags as a new infrastructure, a new wireless platform on which novel applications can be developed. The book begins with an introduction to the problems of tag estimation and information collection from RFID systems, and explains the challenges. It discusses how to efficiently estimate the number of tags in a large RFID system, considering both energy cost and execution time. It then gives a detailed account on how to collect information from a sensor-augmented RFID network with new designs that significantly reduce execution time.

[1]  G. Casella,et al.  Statistical Inference , 2003, Encyclopedia of Social Network Analysis and Mining.

[2]  Chae-Woo Lee,et al.  An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[3]  Yuanqing Zheng,et al.  Fast tag searching protocol for large-scale RFID systems , 2011, ICNP 2011.

[4]  Yunhao Liu,et al.  Cardinality Estimation for Large-Scale RFID Systems , 2011, IEEE Trans. Parallel Distributed Syst..

[5]  Shigang Chen,et al.  Probabilistic missing-tag detection and energy-time tradeoff in large-scale RFID systems , 2012, MobiHoc '12.

[6]  Yunhao Liu,et al.  Refresh: Weak Privacy Model for RFID Systems , 2010, 2010 Proceedings IEEE INFOCOM.

[7]  Motoki Miura,et al.  An Empirical Study of an RFID Mat Sensor System in a Group Home , 2009, J. Networks.

[8]  Kai Bu,et al.  Efficient pinpointing of misplaced tags in large RFID systems , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[9]  Ming Zhang,et al.  Efficient information collection protocols for sensor-augmented RFID networks , 2011, 2011 Proceedings IEEE INFOCOM.

[10]  Bo Sheng,et al.  Efficient Continuous Scanning in RFID Systems , 2010, 2010 Proceedings IEEE INFOCOM.

[11]  D. Wyld Radio Frequency Identification , 2008 .

[12]  Chenling Huang,et al.  A two-stage wake-up circuit for semi-passive RFID tag , 2009, 2009 IEEE 8th International Conference on ASIC.

[13]  Sridhar Radhakrishnan,et al.  A framework for fast RFID tag reading in static and mobile environments , 2008, Comput. Networks.

[14]  Tassos Dimitriou,et al.  A secure and efficient RFID protocol that could make big brother (partially) obsolete , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).

[15]  Murali S. Kodialam,et al.  Anonymous Tracking Using RFID Tags , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[16]  Feng Zhou,et al.  Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID systems , 2004, Proceedings of the 2004 International Symposium on Low Power Electronics and Design (IEEE Cat. No.04TH8758).

[17]  E. L. Lehmann,et al.  Theory of point estimation , 1950 .

[18]  Yunhao Liu,et al.  Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , 2007, PerCom.

[19]  Bo Sheng,et al.  Finding popular categories for RFID tags , 2008, MobiHoc '08.

[20]  Shigang Chen,et al.  Energy Efficient Algorithms for the RFID Estimation Problem , 2010, 2010 Proceedings IEEE INFOCOM.

[21]  Yunhao Liu,et al.  LANDMARC: Indoor Location Sensing Using Active RFID , 2004, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[22]  Bo Li,et al.  Using Analog Network Coding to Improve the RFID Reading Throughput , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[23]  Lawrence G. Roberts,et al.  ALOHA packet system with and without slots and capture , 1975, CCRV.

[24]  Na Yang,et al.  Congestion Avoidance Based on Lightweight Buffer Management in Sensor Networks , 2006 .

[25]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[26]  Shiping Chen,et al.  Energy-efficient polling protocols in RFID systems , 2011, MobiHoc '11.

[27]  Murali S. Kodialam,et al.  Fast and reliable estimation schemes in RFID systems , 2006, MobiCom '06.

[28]  Roy Want,et al.  An introduction to RFID technology , 2006, IEEE Pervasive Computing.

[29]  Yunhao Liu,et al.  ACTION: Breaking the Privacy Barrier for RFID Systems , 2009, IEEE INFOCOM 2009.

[30]  Shigang Chen,et al.  Efficient Protocols for Identifying the Missing Tags in a Large RFID System , 2013, IEEE/ACM Transactions on Networking.

[31]  Christian Floerkemeier,et al.  Comparison of transmission schemes for framed ALOHA based RFID protocols , 2006, International Symposium on Applications and the Internet Workshops (SAINTW'06).

[32]  Shigang Chen,et al.  Privacy-preserving RFID authentication based on cryptographical encoding , 2012, 2012 Proceedings IEEE INFOCOM.

[33]  Masashi Shimizu,et al.  Framed ALOHA for Multiple RFID Objects Identification , 2005, IEICE Trans. Commun..

[34]  Damith C. Ranasinghe,et al.  Sensor-enabled RFID tag handbook , 2008 .

[35]  Wonjun Lee,et al.  Adaptive splitting protocols for RFID tag collision arbitration , 2006, MobiHoc '06.

[36]  Jae-Hyun Kim,et al.  Dynamic framed slotted ALOHA algorithms using fast tag estimation method for RFID system , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[37]  C. Floerkemeier Transmission control scheme for fast RFID object identification , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[38]  Bo Sheng,et al.  Counting RFID Tags Efficiently and Anonymously , 2010, 2010 Proceedings IEEE INFOCOM.

[39]  Harald Vogt,et al.  Efficient Object Identification with Passive RFID Tags , 2002, Pervasive.

[40]  Yunhao Liu,et al.  Randomizing RFID private authentication , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[41]  Shiping Chen,et al.  Efficient missing tag detection in RFID systems , 2011, 2011 Proceedings IEEE INFOCOM.

[42]  Miao Pan,et al.  A time-efficient information collection protocol for large-scale RFID systems , 2012, 2012 Proceedings IEEE INFOCOM.

[43]  Anirudha Sahoo,et al.  Intelligent Query Tree (IQT) Protocol to Improve RFID Tag Read Efficiency , 2006, 9th International Conference on Information Technology (ICIT'06).

[44]  Yuguang Fang,et al.  Lexicographic Maxmin Fairness for Data Collection in Wireless Sensor Networks , 2007, IEEE Transactions on Mobile Computing.

[45]  Kyu-Young Whang,et al.  A linear-time probabilistic counting algorithm for database applications , 1990, TODS.

[46]  Bo Sheng,et al.  How to Monitor for Missing RFID tags , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[47]  Úlfar Erlingsson,et al.  A cool and practical alternative to traditional hash tables , 2006 .

[48]  P. Flajolet,et al.  Loglog counting of large cardinalities , 2003 .