Nicht aus der Schweiz? Besuchen Sie lehmanns.de

RFID Technologies for Internet of Things (eBook)

, (Autoren)

eBook Download: PDF
2016 | 1st ed. 2016
VII, 95 Seiten
Springer International Publishing (Verlag)
978-3-319-47355-0 (ISBN)

Lese- und Medienproben

RFID Technologies for Internet of Things - Min Chen, Shigang Chen
Systemvoraussetzungen
106,99 inkl. MwSt
(CHF 104,50)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This book introduces applications of RFID on the Internet of things, under the emerging technologies for tag search, anonymous RFID authentication, and identification of networked tags. A new technique called filtering vector (a compact data structure that encodes tag IDs) is proposed to enable tag filtration, meeting the stringent delay requirements for real-world applications. Based on filtering vectors, a novel iterative tag search protocol is designed, which progressively improves the accuracy of search result and reduces the time of each iteration by using the information learned from the previous iterations. Moreover, the protocol is extended to work under noisy channel.

The authors also make a fundamental shift from the traditional design paradigm for anonymous RFID authentication by following an asymmetry design principle that pushes most complexity to the readers while leaving the tags as simple as possible. A novel technique is developed to dynamically generate random tokens on demand for authentication. The token-based authentication protocol only requires O(1) communication overhead and online computation overhead per authentication for both readers and tags.

Finally, the authors investigate the problem of networked-tag identification. The traditional contention-based protocol design will incur too much energy overhead in multihop tag systems, and a reader-coordinated design that significantly serializes tag transmissions performs much better. In addition, a solution based on serial numbers is proposed to achieve load balancing, thereby reducing the worst-case energy cost among the tags.

Designed for researchers and professionals, this SpringerBrief will interest individuals who work in efficiency, security, and privacy. Advanced-level students focused on network design will also benefit from the content.

Contents 5
1 Introduction 8
1.1 Internet of Things 8
1.2 RFID Technologies 8
1.3 Tag Search Problem 9
1.4 Anonymous RFID Authentication 10
1.5 Identification of Networked Tags 11
1.6 Outline of the Book 12
References 12
2 Efficient Tag Search in Large RFID Systems 15
2.1 System Model and Problem Statement 15
2.1.1 System Model 15
2.1.2 Time Slots 16
2.1.3 Problem Statement 16
2.2 Related Work 17
2.2.1 Tag Identification 17
2.2.2 Polling Protocol 19
2.2.3 CATS Protocol 19
2.3 A Fast Tag Search Protocol Based on Filtering Vectors 20
2.3.1 Motivation 20
2.3.2 Bloom Filter 21
2.3.3 Filtering Vectors 21
2.3.4 Iterative Use of Filtering Vectors 23
2.3.5 Generalized Approach 24
2.3.6 Values of mi 25
2.3.7 Iterative Tag Search Protocol 28
2.3.7.1 Phase One 28
2.3.7.2 Phase Two 28
2.3.8 Cardinality Estimation 29
2.3.9 Additional Filtering Vectors 30
2.3.10 Hardware Requirement 30
2.4 ITSP over Noisy Channel 31
2.4.1 ITSP with Noise on Forward Link 31
2.4.2 ITSP with Noise on Reverse Link 32
2.4.2.1 ITSP Under Random Error Model (ITSP-rem) 33
2.4.2.2 ITSP Under Burst Error Model (ITSP-bem) 33
2.5 Performance Evaluation 35
2.5.1 Performance Metric 35
2.5.2 Performance Comparison 35
2.5.3 False -Positive Ratio 37
2.5.4 Performance Evaluation Under Channel Error 38
2.5.4.1 Performance of ITSP-rem and ITSP-bem 38
2.5.4.2 False-Positive Ratio of ITSP-rem and ITSP-bem 40
2.5.4.3 Signal Loss Due to Fading Channel 42
2.6 Summary 43
References 43
3 Lightweight Anonymous RFID Authentication 45
3.1 System Model and Security Model 45
3.1.1 System Model 45
3.1.2 Security Model 46
3.2 Related Work 48
3.2.1 Non-tree-Based Protocols 48
3.2.2 Tree-Based Protocols 49
3.3 A Strawman Solution 49
3.3.1 Motivation 49
3.3.2 A Strawman Solution 50
3.4 Dynamic Token-Based Authentication Protocol 51
3.4.1 Motivation 51
3.4.2 Overview 52
3.4.3 Initialization Phase 52
3.4.4 Authentication Phase 53
3.4.5 Updating Phase 53
3.4.6 Randomness Analysis 55
3.4.7 Discussion 58
3.4.8 Potential Problems of TAP 59
3.5 Enhanced Dynamic Token-Based Authentication Protocol 59
3.5.1 Resistance Against Desynchronization and Replay Attacks 59
3.5.2 Resolving Hash Collisions 61
3.5.3 Discussion 64
3.6 Security Analysis 65
3.7 Numerical Results 66
3.7.1 Effectiveness of Multi-Hash Scheme 66
3.7.2 Token-Level Randomness 67
3.7.3 Bit-Level Randomness 67
3.8 Summary 70
References 70
4 Identifying State-Free Networked Tags 72
4.1 System Model and Problem Statement 72
4.1.1 Networked Tag System 72
4.1.2 Problem Statement 73
4.1.3 State-Free Networked Tags 73
4.1.4 System Model 74
4.2 Related Work 75
4.3 Contention-Based ID Collection Protocol for Networked Tag Systems 76
4.3.1 Motivation 76
4.3.2 Request Broadcast Protocol 77
4.3.3 ID Collection Protocol 79
4.4 Serialized ID Collection Protocol 80
4.4.1 Motivation 80
4.4.2 Overview 80
4.4.3 Biased Energy Consumption 81
4.4.4 Serial Numbers 82
4.4.5 Parent Selection 83
4.4.6 Serialization at Tier Two 84
4.4.7 Recursive Serialization 85
4.4.8 Frame Size 87
4.4.9 Load Factor Per Tag 88
4.5 Improving Time Efficiency of SICP 90
4.5.1 Request Aggregation 90
4.5.2 ID-Transmission Pipelining 91
4.6 Evaluation 94
4.6.1 Simulation Setup 94
4.6.2 Children Degree and Load Factor 95
4.6.3 Performance Comparison 96
4.6.4 Performance Tradeoff for SICP and p-SICP 97
4.6.5 Time-Efficiency Comparison of SCIP and p-SICP 98
4.7 Summary 98
References 100

Erscheint lt. Verlag 2.11.2016
Reihe/Serie Wireless Networks
Wireless Networks
Zusatzinfo VII, 95 p. 37 illus.
Verlagsort Cham
Sprache englisch
Themenwelt Mathematik / Informatik Informatik
Technik Nachrichtentechnik
Schlagworte anonymous authentication • Content-based protocol design • Cyber-Physical Systems • Filtering vectors • internet of things • Multihop tag systems • Networked tag identification • Networking paradigm • RFID • Tag search • Token-based authentication protocol
ISBN-10 3-319-47355-7 / 3319473557
ISBN-13 978-3-319-47355-0 / 9783319473550
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 2,0 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Konzepte, Methoden, Lösungen und Arbeitshilfen für die Praxis

von Ernst Tiemeyer

eBook Download (2023)
Carl Hanser Verlag GmbH & Co. KG
CHF 68,35
Konzepte, Methoden, Lösungen und Arbeitshilfen für die Praxis

von Ernst Tiemeyer

eBook Download (2023)
Carl Hanser Verlag GmbH & Co. KG
CHF 68,35
Der Weg zur professionellen Vektorgrafik

von Uwe Schöler

eBook Download (2024)
Carl Hanser Verlag GmbH & Co. KG
CHF 29,30