期刊文献+

大规模RFID系统中一种能量有效的丢失标签快速检测算法 被引量:20

An Energy-Efficient and Fast Missing Tag Detection Algorithm in Large Scale RFID Systems
在线阅读 下载PDF
导出
摘要 在基于主动式标签构建的RFID系统中,如何以能量有效的方式检测出丢失标签是一个重要的研究问题.针对多阅读器RFID系统,首次提出一种基于虚拟布鲁姆过滤器的丢失标签检测算法BMD,能够以较低的能量开销快速地检测出丢失标签.算法的核心思想是让标签在一个查询帧中对RFID阅读器进行多次回复,并基于回复信息构造若干"虚拟"布鲁姆过滤器来进行丢失标签检测.理论分析和仿真结果均表明了BMD算法的有效性.相比于传统的基于标签标识号收集的检测方法,BMD算法的能耗要低一个数量级,算法执行时间减少了最高达52%;相比于当前最好的单阅读器丢失标签检测算法IIP,BMD算法的能耗要低两个数量级以上,并且算法执行时间减少了最高达80%. In RFID systems built with active tags, how to detect missing tags in an energy efficient manner is an important research topic. In this paper, we propose a virtual Bloom filter based missing tag detection algorithm (BMD) that can detect missing tags efficiently and fast in multiple reader RFID systems. The key idea is to let tags reply to the reader multiple times in one frame and construct a virtual Bloom filter representing tags in the reader's interrogation region, based on which the missing tags can be detected. Both theoretical analysis and simulation results demonstrate the effectiveness of the proposed BMD algorithm. Compared with the traditional ID collection based algorithm, BMD reduces per tag energy consumption by more than an order of magnitude and reduces detection time by at most 52~/oo. Compared with liP, the current best missing tag detection algorithm for single reader RFID systems, BMD reduces per tag energy consumption by more than two orders of magnitude and reduces detection time by at most 80%.
出处 《计算机学报》 EI CSCD 北大核心 2014年第2期434-444,共11页 Chinese Journal of Computers
基金 国家自然科学基金重点项目(61232001/F02) 国家自然科学基金面上项目(61173169) 国家自然科学基金青年项目(61103203,61202341)资助~~
关键词 无线射频识别 丢失标签检测 布鲁姆过滤器 能量有效 物联网 RFID missing tag detection Bloom filter energy efficiency Internet of Things
  • 相关文献

参考文献1

二级参考文献36

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860MHz to 960MHz[S]. 2004
  • 3Gong L, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols [C] //Proc of the 1990 IEEE Computer Society Symp on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990:234-248
  • 4Tsudik G. YA-TRAP, yet another trivial RFID authentication protocol [C] //Proc of the 4th Annual IEEE Int conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006 : 640-643
  • 5Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
  • 6Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh:AIM Inc. , 2001
  • 7Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C] //Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005:70-84
  • 8Finkenzeller K. RFID Handbook: Radio Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, 2003
  • 9Avoine G, Oechslin P. RFID traceability: A multilayer problem [C] //Proc of the 9th Int Conf on Financial Cryptography. Berlin: Springer, 2005:125-140
  • 10Peris-Lopez P, Cesar Hernandez Castro J, Estevez Tapiador J M, et al. RFID systems: A survey on security threats and proposed solutions [C] //Proc of the IFIP- TC6 11th Int Conf on Personal Wireless Communications. Berlin: Springer, 2006: 159-170

共引文献92

同被引文献115

引证文献20

二级引证文献67

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部