Conflict multiplicity estimation and batch resolution algorithms
IEEE Transactions on Information Theory
Efficient Object Identification with Passive RFID Tags
Pervasive '02 Proceedings of the First International Conference on Pervasive Computing
Steady-state analysis of a slotted and controlled Aloha system with blocking
ACM SIGCOMM Computer Communication Review
A Scalable and Provably Secure Hash-Based RFID Protocol
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Novel Anti-collision Algorithms for Fast Object Identification in RFID System
ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems - Workshops - Volume 02
An Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
Tree Slotted Aloha: a New Protocol for Tag Identification in RFID Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Fast and reliable estimation schemes in RFID systems
Proceedings of the 12th annual international conference on Mobile computing and networking
Severless Search and Authentication Protocols for RFID
PERCOM '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy.
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
Finding popular categories for RFID tags
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
S3PR: Secure Serverless Search Protocols for RFID
ISA '08 Proceedings of the 2008 International Conference on Information Security and Assurance (isa 2008)
THE ALOHA SYSTEM: another alternative for computer communications
AFIPS '70 (Fall) Proceedings of the November 17-19, 1970, fall joint computer conference
A case against currently used hash functions in RFID protocols
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
DRAP: a Robust Authentication protocol to ensure survivability of computational RFID networks
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Hi-index | 0.00 |
Massively deploying RFID systems that preserve data integrity and security is a major challenge of the coming years. Since RFID tags are extremely constrained in time and space, enforcing high level of security with excessive cryptographic computation is not possible. Secured mechanisms for tag authentication have been in the midst of researcher's interest for almost a decade. One extension of RFID authentication is RFID tag searching, which has not been given much attention so far. But we firmly believe that in near future tag searching will be a significant issue. And tag searching need to be scalable as RFID tags are deployed comprehensively within a system. In this paper we propose a scalable and lightweight RFID tag searching protocol. This protocol can search a particular tag efficiently as the approach is not based on exhaustive search. This approach does not employ extreme computing or cryptographic functions. Our proposed scalable search protocol is secured against major security threats and it is suitable to be used in numerous real life situations.