RFID Technologies for Internet of Things

This book introduces applications of RFID on the Internet of things, under the emerging technologies for tag search, anonymous RFID authentication, and identification of networked tags. A new technique called filtering vector (a compact data structure that encodes tag IDs) is proposed to enable tag...

Full description

Bibliographic Details
Main Authors: Chen, Min, Chen, Shigang (Author)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2016, 2016
Edition:1st ed. 2016
Series:Wireless Networks
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03096nmm a2200325 u 4500
001 EB001273233
003 EBX01000000000000000887875
005 00000000000000.0
007 cr|||||||||||||||||||||
008 161202 ||| eng
020 |a 9783319473550 
100 1 |a Chen, Min 
245 0 0 |a RFID Technologies for Internet of Things  |h Elektronische Ressource  |c by Min Chen, Shigang Chen 
250 |a 1st ed. 2016 
260 |a Cham  |b Springer International Publishing  |c 2016, 2016 
300 |a VII, 95 p. 37 illus  |b online resource 
505 0 |a Introduction -- Efficient Tag Search in Large RFID Systems -- Lightweight Anonymous RFID Authentication -- Identifying State-Free Networked Tags 
653 |a Information Systems Applications (incl. Internet) 
653 |a Communications Engineering, Networks 
653 |a Electrical engineering 
653 |a Computer communication systems 
653 |a Application software 
653 |a Computer Communication Networks 
700 1 |a Chen, Shigang  |e [author] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Wireless Networks 
856 4 0 |u https://doi.org/10.1007/978-3-319-47355-0?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.7 
520 |a This book introduces applications of RFID on the Internet of things, under the emerging technologies for tag search, anonymous RFID authentication, and identification of networked tags. A new technique called filtering vector (a compact data structure that encodes tag IDs) is proposed to enable tag filtration, meeting the stringent delay requirements for real-world applications. Based on filtering vectors, a novel iterative tag search protocol is designed, which progressively improves the accuracy of search result and reduces the time of each iteration by using the information learned from the previous iterations. Moreover, the protocol is extended to work under noisy channel. The authors also make a fundamental shift from the traditional design paradigm for anonymous RFID authentication by following an asymmetry design principle that pushes most complexity to the readers while leaving the tags as simple as possible. A novel technique is developed to dynamically generate random tokens on demand for authentication. The token-based authentication protocol only requires O(1) communication overhead and online computation overhead per authentication for both readers and tags. Finally, the authors investigate the problem of networked-tag identification. The traditional contention-based protocol design will incur too much energy overhead in multihop tag systems, and a reader-coordinated design that significantly serializes tag transmissions performs much better. In addition, a solution based on serial numbers is proposed to achieve load balancing, thereby reducing the worst-case energy cost among the tags. Designed for researchers and professionals, this SpringerBrief will interest individuals who work in efficiency, security, and privacy. Advanced-level students focused on network design will also benefit from the content