Managing RFID Data: Challenges, Opportunities and Solutions

The advances of Radio-Frequency Identification (RFID) technology have significantly enhanced the capability of capturing data from pervasive space. It becomes a great challenge in the information era to effectively understand human behavior, mobility and activity through the perceived RFID data. Focusing on RFID data management, this article provides an overview of current challenges, emerging opportunities and recent progresses in RFID. In particular, this article has described and analyzed the research work on three aspects: algorithm, protocol and performance evaluation. We investigate the research progress in RFID with anti-collision algorithms, authentication and privacy protection protocols, localization and activity sensing, as well as performance tuning in realistic settings. We emphasize the basic principles of RFID data management to understand the state-of-the-art and to address directions of future research in RFID.

[1]  F. Schoute,et al.  Dynamic Frame Length ALOHA , 1983, IEEE Trans. Commun..

[2]  S. Seidel,et al.  914 MHz path loss prediction models for indoor wireless communications in multifloored buildings , 1992 .

[3]  Gaetano Borriello,et al.  SpotON: An Indoor 3D Location Sensing Technology Based on RF Signal Strength , 2000 .

[4]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[5]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.

[6]  Harald Vogt,et al.  Efficient Object Identification with Passive RFID Tags , 2002, Pervasive.

[7]  Daniel W. Engels,et al.  I. Radio-Frequency Identification: Security Risks and Challenges , 2003 .

[8]  Yunhao Liu,et al.  LANDMARC: Indoor Location Sensing Using Active RFID , 2004, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[9]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[10]  Sozo Inoue,et al.  RFID Privacy Using User-Controllable Uniqueness , 2003 .

[11]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[12]  Steven Shepard RFID: Radio Frequency Identification , 2004 .

[13]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[14]  Masashi Shimizu,et al.  Framed ALOHA for Multiple RFID Objects Identification , 2005, IEICE Trans. Commun..

[15]  Chae-Woo Lee,et al.  An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[16]  Ron Weinstein,et al.  RFID: a technical overview and its application to the enterprise , 2005, IT Professional.

[17]  Jaideep Srivastava,et al.  Adaptive binary splitting for efficient RFID tag anti-collision , 2006, IEEE Communications Letters.

[18]  Daniel D. Deavours,et al.  Performance benchmarks for passive UHF RFID tags , 2006, MMB.

[19]  Tassos Dimitriou,et al.  A secure and efficient RFID protocol that could make big brother (partially) obsolete , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).

[20]  Sheng Zhong,et al.  Privacy-Preserving Queries on Encrypted Data , 2006, ESORICS.

[21]  Jin Mitsugi,et al.  Anti-collision performance of Gen2 air protocol in random error communication link , 2006, International Symposium on Applications and the Internet Workshops (SAINTW'06).

[22]  Murali S. Kodialam,et al.  Fast and reliable estimation schemes in RFID systems , 2006, MobiCom '06.

[23]  Jongsung Kim,et al.  HIGHT: A New Block Cipher Suitable for Low-Resource Device , 2006, CHES.

[24]  Minos N. Garofalakis,et al.  Adaptive cleaning for RFID data streams , 2006, VLDB.

[25]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[26]  Robert H. Deng,et al.  Private Information Retrieval Using Trusted Hardware , 2006, IACR Cryptol. ePrint Arch..

[27]  Murali S. Kodialam,et al.  Anonymous Tracking Using RFID Tags , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[28]  C. Floerkemeier Bayesian Transmission Strategy for Framed ALOHA Based RFID Protocols , 2007, 2007 IEEE International Conference on RFID.

[29]  Yunhao Liu,et al.  VIRE: Active RFID-based Localization Using Virtual Reference Elimination , 2007, 2007 International Conference on Parallel Processing (ICPP 2007).

[30]  Pedro M. Reyes,et al.  RFID: the state of the union between promise and practice , 2007 .

[31]  Daniel D. Deavours,et al.  Evaluation of the State of Passive UHF RFID: An Experimental Approach , 2007, IEEE Systems Journal.

[32]  Yunhao Liu,et al.  Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , 2007, PerCom.

[33]  Christof Paar,et al.  New Light-Weight Crypto Algorithms for RFID , 2007, 2007 IEEE International Symposium on Circuits and Systems.

[34]  Tieyan Li,et al.  A cross-layer framework for privacy enhancement in RFID systems , 2008, Pervasive Mob. Comput..

[35]  Harvey Lehpamer RFID Design Principles , 2008 .

[36]  Bo Sheng,et al.  Finding popular categories for RFID tags , 2008, MobiHoc '08.

[37]  David Wetherall,et al.  An empirical study of UHF RFID performance , 2008, MobiCom '08.

[38]  Hung-Min Sun,et al.  A Gen2-Based RFID Authentication Protocol for Security and Privacy , 2009, IEEE Transactions on Mobile Computing.

[39]  Shaojie Tang,et al.  RASPberry: A stable reader activation scheduling protocol in multi-reader RFID systems , 2009, 2009 17th IEEE International Conference on Network Protocols.

[40]  Yunhao Liu,et al.  ACTION: Breaking the Privacy Barrier for RFID Systems , 2009, IEEE INFOCOM 2009.

[41]  Hongyi Wu,et al.  Smart Trend-Traversal: A Low Delay and Energy Tag Arbitration Protocol for Large RFID Systems , 2009, IEEE INFOCOM 2009.

[42]  M Ayoub Khan,et al.  Location Estimation Technique using Extended 3-D LANDMARC Algorithm for Passive RFID Tag , 2009, 2009 IEEE International Advance Computing Conference.

[43]  Ravikanth Pappu,et al.  An Optimal Q-Algorithm for the ISO 18000-6C RFID Protocol , 2009, IEEE Transactions on Automation Science and Engineering.

[44]  Yunhao Liu,et al.  Randomizing RFID private authentication , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[45]  Charles C. Kemp,et al.  RF vision: RFID receive signal strength indicator (RSSI) images for sensor fusion and mobile manipulation , 2009, 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[46]  Wen-Tzu Chen,et al.  An Accurate Tag Estimate Method for Improving the Performance of an RFID Anticollision Algorithm Based on Dynamic Frame Length ALOHA , 2009, IEEE Transactions on Automation Science and Engineering.

[47]  Bo Sheng,et al.  Efficient Continuous Scanning in RFID Systems , 2010, 2010 Proceedings IEEE INFOCOM.

[48]  Chen Qian,et al.  ASAP: Scalable Identification and Counting for Contactless RFID Systems , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[49]  K. V. S. Rao,et al.  Phase based spatial identification of UHF RFID tags , 2010, 2010 IEEE International Conference on RFID (IEEE RFID 2010).

[50]  Lei Yang,et al.  Identification-free batch authentication for RFID tags , 2010, The 18th IEEE International Conference on Network Protocols.

[51]  Klaus Finkenzeller,et al.  Rfid Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification , 2003 .

[52]  Xiaojun Jing,et al.  An environmental-adaptive RSSI based indoor positioning approach using RFID , 2010 .

[53]  Bo Sheng,et al.  Efficient Tag Identification in Mobile RFID Systems , 2010, 2010 Proceedings IEEE INFOCOM.

[54]  Bo Sheng,et al.  Counting RFID Tags Efficiently and Anonymously , 2010, 2010 Proceedings IEEE INFOCOM.

[55]  Kwan-Wu Chin,et al.  A Survey and Tutorial of RFID Anti-Collision Protocols , 2010, IEEE Communications Surveys & Tutorials.

[56]  Weilian Su,et al.  Multiple RFID Tags Access Algorithm , 2010, IEEE Transactions on Mobile Computing.

[57]  Qun Li,et al.  Privacy protection for RFID-based tracking systems , 2010, 2010 IEEE International Conference on RFID (IEEE RFID 2010).

[58]  Yong Guan,et al.  Lightweight Mutual Authentication and Ownership Transfer for RFID Systems , 2010, 2010 Proceedings IEEE INFOCOM.

[59]  Guoliang Xing,et al.  Negotiate power and performance in the reality of RFID systems , 2010, 2010 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[60]  Markus Cremer,et al.  New measurement results for the localization of UHF RFID transponders using an Angle of Arrival (AoA) approach , 2011, 2011 IEEE International Conference on RFID.

[61]  Guoliang Xing,et al.  Read More with Less: An Adaptive Approach to Energy-Efficient RFID Systems , 2011, IEEE Journal on Selected Areas in Communications.

[62]  Shiping Chen,et al.  Energy-efficient polling protocols in RFID systems , 2011, MobiHoc '11.

[63]  Ming Zhang,et al.  Efficient information collection protocols for sensor-augmented RFID networks , 2011, 2011 Proceedings IEEE INFOCOM.

[64]  Cornel Turcu,et al.  Current Trends and Challenges in RFID , 2011 .

[65]  Minyi Guo,et al.  TASA: Tag-Free Activity Sensing Using RFID Tag Arrays , 2011, IEEE Transactions on Parallel and Distributed Systems.

[66]  Lei Yang,et al.  Season: Shelving interference and joint identification in large-scale RFID systems , 2011, 2011 Proceedings IEEE INFOCOM.

[67]  Yuanqing Zheng,et al.  Fast tag searching protocol for large-scale RFID systems , 2011, ICNP 2011.

[68]  Sheikh Iqbal Ahamed,et al.  AnonPri: An efficient anonymous private authentication protocol , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[69]  László Monostori,et al.  A survey of applications and requirements of unique identification systems and RFID techniques , 2011, Comput. Ind..

[70]  Susanne Winter,et al.  Phase difference based RFID navigation for medical applications , 2011, 2011 IEEE International Conference on RFID.

[71]  Jürgen Götze,et al.  Localization of UHF RFID labels with reference tags and Unscented Kalman Filter , 2011, 2011 IEEE International Conference on RFID-Technologies and Applications.

[72]  Martin Vossiek,et al.  Holographic localization of passive UHF RFID transponders , 2011, 2011 IEEE International Conference on RFID.

[73]  Vladimir Risojevic,et al.  Indoor RFID localization improved by motion segmentation , 2011, 2011 7th International Symposium on Image and Signal Processing and Analysis (ISPA).

[74]  Yunhao Liu,et al.  Cardinality Estimation for Large-Scale RFID Systems , 2011, IEEE Trans. Parallel Distributed Syst..

[75]  Weiping Zhu,et al.  Fault-tolerant RFID reader localization based on passive RFID tags , 2012, 2012 Proceedings IEEE INFOCOM.

[76]  Yunhao Liu,et al.  Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays , 2012, IEEE Transactions on Parallel and Distributed Systems.

[77]  Weiping Zhu,et al.  A hybrid method for achieving high accuracy and efficiency in object tracking using passive RFID , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications.

[78]  Shigang Chen,et al.  Privacy-preserving RFID authentication based on cryptographical encoding , 2012, 2012 Proceedings IEEE INFOCOM.

[79]  Anshul Rai,et al.  Zee: zero-effort crowdsourcing for indoor localization , 2012, Mobicom '12.

[80]  Yunhao Liu,et al.  Locating in fingerprint space: wireless indoor localization with little human intervention , 2012, Mobicom '12.

[81]  Lianlin Zhao,et al.  A real-time RFID localization experiment using propagation models , 2012, 2012 IEEE International Conference on RFID (RFID).

[82]  Honggang Zhang,et al.  Green communications: Theoretical fundamentals, algorithms, and applications , 2012 .

[83]  Olivier Savry,et al.  A cross layer approach to preserve privacy in RFID ISO/IEC 15693 systems , 2012, 2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA).

[84]  Alex X. Liu,et al.  Every bit counts: fast and scalable RFID estimation , 2012, Mobicom '12.

[85]  Xi Chen,et al.  Continuous scanning with mobile reader in RFID systems: an experimental study , 2013, MobiHoc.

[86]  Kazuya Sakai,et al.  Dynamic Bit Encoding for Privacy Protection against Correlation Attacks in RFID Backward Channel , 2013, IEEE Transactions on Computers.

[87]  Yunhao Liu,et al.  Informative counting: fine-grained batch authentication for large-scale RFID systems , 2013, MobiHoc.

[88]  Kazuya Sakai,et al.  Randomized skip lists-based private authentication for large-scale RFID systems , 2013, MobiHoc '13.

[89]  Jie Wu,et al.  Focus and Shoot: Efficient Identification Over RFID Tags in the Specified Area , 2013, MobiQuitous.

[90]  Shigang Chen,et al.  Efficient Protocols for Identifying the Missing Tags in a Large RFID System , 2013, IEEE/ACM Transactions on Networking.

[91]  Xi Chen,et al.  Adaptive Accurate Indoor-Localization Using Passive RFID , 2013, 2013 International Conference on Parallel and Distributed Systems.