Survey of Integrity Detection Methods in Internet of Things

Internet of Things (IoT) has received more and more concerns in academia and industry since it was first proposed. With the decrease of tag price and the development of electronic equipments, IoT is widely used to manage the commodities in modern logistic warehouse. As the commodities move in and out of the warehouse frequently every day, there is a need to devise an efficient solution to detect the integrity of a batch of commodities in such an environment. Many detection methods are analyzed and compared in the paper. At the same time, some promising and potential research directions on integrity detection are listed at the end of the paper.

[1]  Anthony Ephremides,et al.  An exact analysis and performance evaluation of framed ALOHA with capture , 1989, IEEE Trans. Commun..

[2]  Murali S. Kodialam,et al.  Fast and reliable estimation schemes in RFID systems , 2006, MobiCom '06.

[3]  Shigang Chen,et al.  Efficient Protocols for Identifying the Missing Tags in a Large RFID System , 2013, IEEE/ACM Transactions on Networking.

[4]  Harald Vogt,et al.  Efficient Object Identification with Passive RFID Tags , 2002, Pervasive.

[5]  Yan Zhang,et al.  Layered Structure and Management in Internet of Things , 2007, Future Generation Communication and Networking (FGCN 2007).

[6]  Lixin Gao,et al.  Energy-Aware Tag Anti-Collision Protocols for RFID Systems , 2007, PerCom.

[7]  Murali S. Kodialam,et al.  Anonymous Tracking Using RFID Tags , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[8]  Wayne H. Wolf,et al.  Cyber-physical Systems , 2009, Computer.

[9]  Li Chao-lian A Dynamic Integrity Detection Scheme with Privacy Preserving in Internet of Things , 2014 .

[10]  Bo Sheng,et al.  How to Monitor for Missing RFID tags , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[11]  Jia Zhai,et al.  An Anti-collision Algorithm Using Two-Functioned Estimation for RFID Tags , 2005, ICCSA.

[12]  Kwan-Wu Chin,et al.  On the energy consumption of Pure and Slotted Aloha based RFID anti-collision protocols , 2009, Comput. Commun..

[13]  Yunhao Liu,et al.  Cardinality Estimation for Large-Scale RFID Systems , 2008, IEEE Transactions on Parallel and Distributed Systems.

[14]  Guojun Wang,et al.  A Light-Weight Commodity Integrity Detection Algorithm Based on Chinese Remainder Theorem , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[15]  Feng Zhou,et al.  Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID systems , 2004, Proceedings of the 2004 International Symposium on Low Power Electronics and Design (IEEE Cat. No.04TH8758).

[16]  Huansheng Ning,et al.  RFID Coding, Name and Information Service for Internet of Things , 2007 .

[17]  Bob Metcalfe,et al.  Steady-state analysis of a slotted and controlled Aloha system with blocking , 1975, CCRV.

[18]  Guojun Wang,et al.  An aggregated signature-based fast RFID batch detection protocol , 2014, Secur. Commun. Networks.

[19]  Kai-Yeung Siu,et al.  Efficient memoryless protocol for tag identification (extended abstract) , 2000, DIALM '00.

[20]  Wonjun Lee,et al.  Adaptive splitting protocols for RFID tag collision arbitration , 2006, MobiHoc '06.

[21]  Shiping Chen,et al.  Efficient missing tag detection in RFID systems , 2011, 2011 Proceedings IEEE INFOCOM.