ALOHA packet system with and without slots and capture
ACM SIGCOMM Computer Communication Review
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
LANDMARC: indoor location sensing using active RFID
Wireless Networks - Special issue: Pervasive computing and communications
An Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
Adaptive splitting protocols for RFID tag collision arbitration
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Fast and reliable estimation schemes in RFID systems
Proceedings of the 12th annual international conference on Mobile computing and networking
A general model of wireless interference
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Efficient storage scheme and query processing for supply chain management using RFID
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
An empirical study of UHF RFID performance
Proceedings of the 14th ACM international conference on Mobile computing and networking
How to Monitor for Missing RFID tags
ICDCS '08 Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems
Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers
IEEE Transactions on Computers
Energy-Aware Tag Anticollision Protocols for RFID Systems
IEEE Transactions on Mobile Computing
False Negative Problem of Counting Bloom Filter
IEEE Transactions on Knowledge and Data Engineering
Refresh: weak privacy model for RFID systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
Energy efficient algorithms for the RFID estimation problem
INFOCOM'10 Proceedings of the 29th conference on Information communications
Counting RFID tags efficiently and anonymously
INFOCOM'10 Proceedings of the 29th conference on Information communications
Efficient error estimating coding: feasibility and applications
Proceedings of the ACM SIGCOMM 2010 conference
Identifying the missing tags in a large RFID system
Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing
Anticollision Protocols for Single-Reader RFID Systems: Temporal Analysis and Optimization
IEEE Transactions on Mobile Computing
Mementos: system support for long-running computation on RFID-scale devices
Proceedings of the sixteenth international conference on Architectural support for programming languages and operating systems
TASA: Tag-Free Activity Sensing Using RFID Tag Arrays
IEEE Transactions on Parallel and Distributed Systems
Dewdrop: an energy-aware runtime for computational RFID
Proceedings of the 8th USENIX conference on Networked systems design and implementation
PET: Probabilistic Estimating Tree for Large-Scale RFID Estimation
ICDCS '11 Proceedings of the 2011 31st International Conference on Distributed Computing Systems
Identification-free batch authentication for RFID tags
ICNP '10 Proceedings of the The 18th IEEE International Conference on Network Protocols
Cardinality Estimation for Large-Scale RFID Systems
IEEE Transactions on Parallel and Distributed Systems
They can hear your heartbeats: non-invasive security for implantable medical devices
Proceedings of the ACM SIGCOMM 2011 conference
Energy-efficient polling protocols in RFID systems
MobiHoc '11 Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing
Secure and Serverless RFID Authentication and Search Protocols
IEEE Transactions on Wireless Communications
Tree algorithms for packet broadcast channels
IEEE Transactions on Information Theory
Efficient and reliable low-power backscatter networks
Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication
RASPberry: A stable reader activation scheduling protocol in multi-reader RFID systems
ICNP '09 Proceedings of the 2009 17th IEEE International Conference on Network Protocols. ICNP 2009
Hi-index | 0.00 |
Fast searching a particular subset in a large number of products attached with radio frequency identification (RFID) tags is of practical importance for a variety of applications, but not yet thoroughly investigated. Since the cardinality of the products can be extremely large, collecting the tag information directly from each of those tags could be highly inefficient. To address the tag searching efficiency in large-scale RFID systems, this paper proposes several algorithms to meet the stringent delay requirement in developing fast tag searching protocols. We formally formulate the tag searching problem in large-scale RFID systems. We propose utilizing compact approximators to efficiently aggregate a large volume of RFID tag information and exchange such information with a two-phase approximation protocol. By estimating the intersection of two compact approximators, the proposed two-phase compact approximator-based tag searching protocol significantly reduces the searching time compared to all possible solutions we can directly borrow from existing studies. We further introduce a scalable cardinality range estimation method that provides inexpensive input for our tag searching protocol. We conduct comprehensive simulations to validate our design. The results demonstrate that the proposed tag searching protocol is highly efficient in terms of both time efficiency and transmission overhead, leading to good applicability and scalability for large-scale RFID systems.