How to Monitor for Missing RFID tags

As RFID tags become more widespread, new approaches for managing larger numbers of RFID tags will be needed. In this paper, we consider the problem of how to accurately and efficiently monitor a set of RFID tags for missing tags. Our approach accurately monitors a set of tags without collecting IDs from them. It differs from traditional research which focuses on faster ways for collecting IDs from every tag. We present two monitoring protocols, one designed for a trusted reader and another for an untrusted reader.

[1]  Selwyn Piramuthu On Existence Proofs for Multiple RFID Tags , 2006, 2006 ACS/IEEE International Conference on Pervasive Services.

[2]  Leonid Bolotnyy,et al.  Generalized "Yoking-Proofs" for a Group of RFID Tags , 2006, 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.

[3]  Francesca Lonetti,et al.  Tree slotted aloha: a new protocol for tag identification in RFID networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[4]  Juan E. Tapiador,et al.  Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).

[5]  Yunhao Liu,et al.  Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[6]  Roy H. Campbell,et al.  MiddleWhere: A Middleware for Location Awareness in Ubiquitous Computing Applications , 2004, Middleware.

[7]  Chae-Woo Lee,et al.  An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[8]  Yanyong Zhang,et al.  RollCall : The Design For A Low-Cost And Power Efficient Active RFID Asset Tracking System , 2007, EUROCON 2007 - The International Conference on "Computer as a Tool".

[9]  Vikram Srinivasan,et al.  MAX: human-centric search of the physical world , 2005, SenSys '05.

[10]  Ari Juels,et al.  "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[11]  Jae-Hyun Kim,et al.  Novel Anti-collision Algorithms for Fast Object Identification in RFID System , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).

[12]  Bo Sheng,et al.  Finding popular categories for RFID tags , 2008, MobiHoc '08.

[13]  Bo Sheng,et al.  Severless Search and Authentication Protocols for RFID , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[14]  Harald Vogt,et al.  Efficient Object Identification with Passive RFID Tags , 2002, Pervasive.

[15]  Roy Want,et al.  Bridging physical and virtual worlds with electronic tags , 1999, CHI '99.

[16]  Murali S. Kodialam,et al.  Fast and reliable estimation schemes in RFID systems , 2006, MobiCom '06.

[17]  Nitin H. Vaidya,et al.  RFID-based networks: exploiting diversity and redundancy , 2008, MOCO.

[18]  Ivan Stojmenovic,et al.  A hybrid randomized protocol for RFID tag identification , 2006 .

[19]  Kouichi Sakurai,et al.  Grouping proof for RFID tags , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[20]  Diego Klabjan,et al.  Warehousing and Analyzing Massive RFID Data Sets , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[21]  Sajal K. Das,et al.  An RFID based technique for handling object distribution and recalls in pervasive transaction environments , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).