A robust RFID inventory

Reading a set of RFID tags all at once is an important feature of the RFID technology for many applications. However, RFID inventory is not completely reliable as tags may be missed in unfavorable situations. In this paper, we propose an application level protocol based on an integrity checking mechanism supporting a reliable inventory process. The integrity information is self-contained in tag group and the protocol does not require any support from an external information system, enabling autonomous and standalone operation.

[1]  Jairo A. Gutiérrez,et al.  Effects of the RFID Mandate on Supply Chain Management , 2008, J. Theor. Appl. Electron. Commer. Res..

[2]  Umakishore Ramachandran,et al.  Load shedding based resource management techniques for RFID data , 2009, 2009 IEEE International Conference on RFID.

[3]  Katina Michael,et al.  The pros and cons of RFID in supply chain management , 2005, International Conference on Mobile Business (ICMB'05).

[4]  Ralf W. Seifert,et al.  Applications of RFID in Supply Chains , 2007 .

[5]  Xue Li,et al.  RFID Data Management: Challenges and Opportunities , 2007, 2007 IEEE International Conference on RFID.

[6]  Martin Feldhofer,et al.  A Case Against Currently Used Hash Functions in RFID Protocols , 2006, OTM Workshops.

[7]  Michel Latteux,et al.  Framed Aloha Based Anti-collision Protocol for RFID tags , 2007 .

[8]  Samir Ranjan Das,et al.  Collision avoidance in a dense RFID network , 2006, WiNTECH.

[9]  Jürgen Bohn Prototypical implementation of location-aware services based on a middleware architecture for super-distributed RFID tag infrastructures , 2006, Personal and Ubiquitous Computing.

[10]  Daniel M. Dobkin,et al.  The RF in RFID: Passive UHF RFID in Practice , 2007 .

[11]  A. Raman,et al.  Execution: The Missing Link in Retail Operations , 2001 .

[12]  Roy Want,et al.  An introduction to RFID technology , 2006, IEEE Pervasive Computing.

[13]  Hyong-Woo Lee,et al.  An Enhanced RFID Multiple Access Protocol for Fast Inventory , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[14]  Michel Banâtre,et al.  Ubi-Check: A Pervasive Integrity Checking System , 2009, NEW2AN.

[15]  Weilian Su,et al.  Multiple RFID Tags Access Algorithm , 2010, IEEE Transactions on Mobile Computing.

[16]  Harald Vogt,et al.  Efficient Object Identification with Passive RFID Tags , 2002, Pervasive.

[17]  Christian Floerkemeier,et al.  The Smart Box Concept for Ubiquitous Computing Environments , 2003 .

[18]  Philippe Oechslin,et al.  A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.