Featherlight information network with delay-endurable RFID support (FINDERS)
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Efficient techniques for monitoring missing RFID tags
IEEE Transactions on Wireless Communications
Efficient tag identification in mobile RFID systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
Energy efficient algorithms for the RFID estimation problem
INFOCOM'10 Proceedings of the 29th conference on Information communications
Counting RFID tags efficiently and anonymously
INFOCOM'10 Proceedings of the 29th conference on Information communications
Identifying the missing tags in a large RFID system
Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing
Energy-efficient polling protocols in RFID systems
MobiHoc '11 Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing
Probabilistic missing-tag detection and energy-time tradeoff in large-scale RFID systems
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
Secure multiple group ownership transfer protocol for mobile RFID
Electronic Commerce Research and Applications
Efficient median estimation for large-scale sensor RFID systems
International Journal of Sensor Networks
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Generalized energy-efficient algorithms for the RFID estimation problem
IEEE/ACM Transactions on Networking (TON)
Fast tag searching protocol for large-scale RFID systems
IEEE/ACM Transactions on Networking (TON)
Efficient protocols for identifying the missing tags in a large RFID system
IEEE/ACM Transactions on Networking (TON)
Personal and Ubiquitous Computing
Hi-index | 0.00 |
As RFID tags become more widespread, new approaches for managing larger numbers of RFID tags will be needed. In this paper, we consider the problem of how to accurately and efficiently monitor a set of RFID tags for missing tags. Our approach accurately monitors a set of tags without collecting IDs from them. It differs from traditional research which focuses on faster ways for collecting IDs from every tag. We present two monitoring protocols, one designed for a trusted reader and another for an untrusted reader.