On Using Sampling Bloom Filter for Unknown Tag Identification in Large-Scale RFID Systems

Radio Frequency Identification (RFID) is one of the key technologies for Internet of things. In RFID systems, the tags without registering in advance are called unknown tags, which usually appear in the scenarios, where the tag-attached objects are moved into or misplaced in the reader’s interrogating area. Consequently, unknown tag identification is significant for RFID-based applications, which is the concentration of this paper. We first propose a basic efficient unknown tag identification protocol based on sampling Bloom filter called UTI-SBF, which consists of known tag deactivation phase and unknown tag identification phase. The idea behind the UTI-SBF protocol is to deactivate the known tags to counteract their interference on the unknown tag identification. Then, we propose an enhanced protocol called EUTI-SBF, which eliminates the non-homogeneous slots based on the UTI-SBF protocol to improve the time efficiency. The parameters of the two protocols are theoretically analyzed to maximize the efficiency. We conduct extensive simulations to evaluate the proposed UTI-SBF and EUTI-SBF protocols and the simulation results illustrate that the UTI-SBF and EUTI-SBF protocols outperform the BUIP protocol. In particular, the EUTI-SBF protocol only consumes about 70% of deactivation time compared with the BUIP protocol in the known tag deactivation phase.

[1]  Weiping Zhu,et al.  Accurate and Efficient Object Tracking Based on Passive RFID , 2015, IEEE Transactions on Mobile Computing.

[2]  Yunhao Liu,et al.  Cardinality Estimation for Large-Scale RFID Systems , 2011, IEEE Trans. Parallel Distributed Syst..

[3]  Bo Sheng,et al.  Efficient techniques for monitoring missing RFID tags , 2010, IEEE Transactions on Wireless Communications.

[4]  Alex X. Liu,et al.  Fast and Reliable Detection and Identification of Missing RFID Tags in the Wild , 2016, IEEE/ACM Transactions on Networking.

[5]  Victor C. M. Leung,et al.  A Time-Ordered Aggregation Model-Based Centrality Metric for Mobile Social Networks , 2018, IEEE Access.

[6]  Jie Wu,et al.  RFID cardinality estimation with blocker tags , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[7]  Zhihong Qian,et al.  Fast unknown tag identification in large-scale RFID systems , 2017, 2017 IEEE/CIC International Conference on Communications in China (ICCC).

[8]  Ming Zhang,et al.  Efficient information collection protocols for sensor-augmented RFID networks , 2011, 2011 Proceedings IEEE INFOCOM.

[9]  Bo Sheng,et al.  Efficient Continuous Scanning in RFID Systems , 2010, 2010 Proceedings IEEE INFOCOM.

[10]  Shaojie Tang,et al.  RASPberry: A stable reader activation scheduling protocol in multi-reader RFID systems , 2009, 2009 17th IEEE International Conference on Network Protocols.

[11]  Feng Xia,et al.  Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems , 2018, IEEE Internet of Things Journal.

[12]  Keqiu Li,et al.  Completely Pinpointing the Missing RFID Tags in a Time-Efficient Way , 2015, IEEE Transactions on Computers.

[13]  Victor C. M. Leung,et al.  Social Sensor Cloud: Framework, Greenness, Issues, and Outlook , 2018, IEEE Network.

[14]  Ching-Hsien Hsu,et al.  Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems , 2011, Inf. Syst. Frontiers.

[15]  Xiao Lu,et al.  Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy , 2018, IEEE Transactions on Dependable and Secure Computing.

[16]  Giuseppe Bianchi,et al.  Revisiting an RFID Identification-Free Batch Authentication Approach , 2011, IEEE Communications Letters.

[17]  Meng Wang,et al.  Modeling and Analysis of Large-Scale Urban Mobility for Green Transportation , 2018, IEEE Transactions on Industrial Informatics.

[18]  Ivan Stojmenovic,et al.  Sampling Bloom Filter-Based Detection of Unknown RFID Tags , 2015, IEEE Transactions on Communications.

[19]  Hairong Qi,et al.  Personalized Privacy-Preserving Task Allocation for Mobile Crowdsensing , 2019, IEEE Transactions on Mobile Computing.

[20]  Lin Chen,et al.  Finding Needles in a Haystack: Missing Tag Detection in Large RFID Systems , 2015, IEEE Transactions on Communications.

[21]  Yong,et al.  Study on RFID Authentication Protocol Theory , 2011 .

[22]  Hairong Qi,et al.  Cost-effective barrier coverage formation in heterogeneous wireless sensor networks , 2017, Ad Hoc Networks.

[23]  Lei Yang,et al.  Identification-free batch authentication for RFID tags , 2010, The 18th IEEE International Conference on Network Protocols.

[24]  Shigeng Zhang,et al.  Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution , 2015, IEEE Transactions on Parallel and Distributed Systems.

[25]  Honglong Chen,et al.  Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems With Unknown Tags , 2017, IEEE Internet of Things Journal.

[26]  Andrea Zanella Adaptive Batch Resolution Algorithm with Deferred Feedback for Wireless Systems , 2012, IEEE Transactions on Wireless Communications.

[27]  Jiguo Yu,et al.  MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems , 2018, IEEE Transactions on Vehicular Technology.

[28]  Jiguo Yu,et al.  Efficient 3-dimensional localization for RFID systems using jumping probe , 2017, Pervasive Mob. Comput..

[29]  Yuguang Fang,et al.  An Efficient Tag Search Protocol in Large-Scale RFID Systems With Noisy Channel , 2013, IEEE/ACM Transactions on Networking.

[30]  Hairong Qi,et al.  Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server , 2019, IEEE Transactions on Mobile Computing.

[31]  Alex X. Liu,et al.  Every bit counts: fast and scalable RFID estimation , 2012, Mobicom '12.

[32]  Victor C. M. Leung,et al.  A Survey on Mobile Data Offloading Technologies , 2018, IEEE Access.

[33]  Hairong Qi,et al.  Achieving location error tolerant barrier coverage for wireless sensor networks , 2017, Comput. Networks.

[34]  Keqiu Li,et al.  Efficient Unknown Tag Identification Protocols in Large-Scale RFID Systems , 2014, IEEE Transactions on Parallel and Distributed Systems.

[35]  Feng Xia,et al.  Probabilistic Detection of Missing Tags for Anonymous Multicategory RFID Systems , 2017, IEEE Transactions on Vehicular Technology.

[36]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[37]  Lei Zhu,et al.  Optimal Framed Aloha Based Anti-Collision Algorithms for RFID Systems , 2010, IEEE Transactions on Communications.

[38]  Jing Sun,et al.  Testing and Defending Methods Against DOS Attack in State Estimation , 2017 .

[39]  Daqiang Zhang,et al.  TIP: Time-Efficient Identification Protocol for Unknown RFID Tags Using Bloom Filters , 2016, 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS).

[40]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[41]  Shaojie Tang,et al.  Reader Activation Scheduling in Multi-reader RFID Systems: A Study of General Case , 2011, 2011 IEEE International Parallel & Distributed Processing Symposium.