The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
RFID: Applications, Security, and Privacy
RFID: Applications, Security, and Privacy
RFID Field Guide: Deploying Radio Frequency Identification Systems
RFID Field Guide: Deploying Radio Frequency Identification Systems
Randomized Pseudo-random Function Tree Walking Algorithm for Secure Radio-Frequency Identification
AUTOID '05 Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies
Multi-Tag Radio Frequency Identification Systems
AUTOID '05 Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies
Antenna Theory: Analysis and Design
Antenna Theory: Analysis and Design
Physically Unclonable Function-Based Security and Privacy in RFID Systems
PERCOM '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
Determining the Position and Orientation of Multi-Tagged Objects Using RFID Technology
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
The Case for Multi-Tag RFID Systems
WASA '07 Proceedings of the International Conference on Wireless Algorithms,Systems and Applications
Area fill synthesis for uniform layout density
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Cartouche: conventions for tangibles bridging diverse interactive systems
Proceedings of the fourth international conference on Tangible, embedded, and embodied interaction
Efficient techniques for monitoring missing RFID tags
IEEE Transactions on Wireless Communications
PUF-Based RFID authentication protocol against secret key leakage
APWeb'12 Proceedings of the 14th Asia-Pacific international conference on Web Technologies and Applications
Hi-index | 0.00 |
Successful object identification is the primary objective of Radio Frequency Identification (RFID) technology. Yet, a recent major study by Wal-Mart has shown that object detection probability can be as low as 66%. We propose the tagging of objects with multiple tags to address the fundamental issue of object detectability. We show that this strategy dramatically improves the efficacy of RFID systems, even in the face of radio noise and other interfering factors. We define different types of multi-tag systems and examine their benefits using analytics, simulations, and experiments with commercial RFID equipment. We investigate the effect of multi-tags on anti-collision algorithms, and develop several techniques that enable multi-tags to enhance RFID security. We suggest new promising applications of multi-tags, ranging from improving patient safety to preventing illegal deforestation. We analyse the economics of multi-tag RFID systems and argue that the benefits of multi-tags will continue to increasingly outweigh their costs in many applications.