Please use this identifier to cite or link to this item:
Title: Pinpointing anomaly RFID tags : situation and opportunities
Authors: Liu, XL 
Xie, X
Wang, K 
Qi, H
Cao, JN 
Guo, S 
Li, KQ
Issue Date: 2017
Publisher: Institute of Electrical and Electronics Engineers
Source: IEEE network, Nov.-Dec. 2017, v. 31, no. 6, p. 40-47 How to cite?
Journal: IEEE network 
Abstract: RFID is one of the most important automatic identification techniques in the future IoT world. Compared with the other techniques, RFID has various advantages such as no requirement of line of sight, the capability of wireless communication, low cost, small size, and so on. This article discusses two types of anomaly tags, i.e., missing tags and unknown tags, which usually appear due to theft or product misplacement. Generally, there are two categories of anomaly tag pinpointing protocols: boolean detection, which aims at probabilistically determining whether there exist anomaly tags or not; and exact identification, which aims at identifying all anomaly tag IDs. This article first conducts a comprehensive survey of the existing anomaly tag pinpointing protocols, particularly emphasizing their evolution road. After that, we also conduct a taxonomy of the existing protocols and summarize their pros and cons. Finally, we discuss some technical challenges and problems that have not been covered yet, and point out the potential opportunities in RFID research and applications.
ISSN: 0890-8044
DOI: 10.1109/MNET.2017.1700043
Appears in Collections:Journal/Magazine Article

View full-text via PolyU eLinks SFX Query
Show full item record


Citations as of Apr 3, 2019


Last Week
Last month
Citations as of Apr 6, 2019

Page view(s)

Citations as of Apr 23, 2019

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.