Back to results list
Please use this identifier to cite or link to this item:
|Title:||Making the most of bits : efficient protocols for monitoring large RFID systems||Authors:||Bu, Kai||Keywords:||Radio frequency identification systems.
Hong Kong Polytechnic University -- Dissertations
|Issue Date:||2013||Publisher:||The Hong Kong Polytechnic University||Abstract:||Radio-Frequency Identification (RFID) technology has stimulated many innovative applications in, for example, supply chain management, health care, mobile payment, ticketing, and target tracking. To support these applications, various protocols are necessary for monitoring RFID systems. A recent trend in monitoring protocol design, triggered by the explosion of RFID technology over the last few years, is toward efficient monitoring in large RFID systems. Established efforts for efficient monitoring protocols lie primarily in cardinality estimation, missing-tag detection, and sensed-information collection. In the thesis, we concentrate on designing efficient protocols for two other monitoring operations, namely misplaced-tag pinpointing and replication attack detection in large RFID systems. We strive for efficiency gains in the protocol design toward making the most of bits. The fewer bits an RFID protocol requires readers and tags to transmit, the more efficiency it promises to large RFID systems. The major contributions of the thesis to efficient monitoring of large RFID systems are threefold. First, we propose efficient misplaced-tag pinpointing protocols. Misplacement errors fail optimal inventory placement and thus significantly decrease profit. The existing misplaced-tag pinpointing solution needs to collect a large amount of data from tags. It suffers from time inefficiency and energy inefficiency as well if active tags are in use. The proposed protocols gain time efficiency and energy efficiency by leveraging reader-related data instead of tag-related data and requiring only a fraction of tags to respond. Second, we propose efficient and privacy-preserving replication attack detection protocols. Replication attacks threaten RFID applications but are hard to prevent. Existing detection protocols are limited in efficiency and privacy mainly due to the transmission of tag IDs. The proposed protocols leverage the broadcast nature and collisions, preserving privacy by avoiding ID transmission. They also integrate lightweight operations to save unnecessary execution time and tag responses, and therefore harvest promising gains in both time efficiency and energy efficiency. Third, considering that tag IDs should be protected to enable and secure privacy-sensitive applications in anonymous RFID systems, we further propose a replication attack detection protocol without requiring tag IDs as a priori. More specifically, the anonymity requires that readers cannot query tag IDs from tags or backend servers. The proposed protocol leverages unreconciled collisions to uncover replication attacks. An unreconciled collision is probably due to responses from multiple tags with the same ID, exactly the evidence of replication attacks. Both theoretical analysis and simulation experiments demonstrate that the proposed protocol can detect replication attacks in anonymous RFID systems fairly fast with required accuracy. In summary, we hope that together with established efficient protocols the proposals in the thesis can greatly benefit various monitoring operations in large RFID systems.||Description:||xx, 136 p. : ill. ; 30 cm.
PolyU Library Call No.: [THS] LG51 .H577P COMP 2013 Bu
|URI:||http://hdl.handle.net/10397/6367||Rights:||All rights reserved.|
|Appears in Collections:||Thesis|
Show full item record
Files in This Item:
|b26390887_link.htm||For PolyU Users||203 B||HTML||View/Open|
|b26390887_ir.pdf||For All Users (Non-printable)||1.68 MB||Adobe PDF||View/Open|
Citations as of Oct 21, 2018
Citations as of Oct 21, 2018
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.