Skip to main content

Cloud-Based Iterative RFID Tag Search Protocol Using Bloom Filters

  • Conference paper
  • First Online:
Cloud Computing (CloudComp 2014)

Abstract

RFID (Radio Frequency Identification) has achieved widespread success in supply chain management, object identification, and assets tracking. In these applications, we often need to search for a particular set of products in a large-scale collection of products. Existing schemes have been proposed, but they are limited by a couple of problems. Firstly, they fail to work under the situation when the cardinality of X is much larger than that of Y. Secondly, they implicitly assume the RFID readers are adequate powerful so that readers can handles a large number of query requests in a short time. To this end, we propose ITSP – Cloud-based Iterative Tag Search Protocol, which can locate the tags in a secure and efficient manner. To be secure, ITSP authenticates the communications between RFID readers and tags to in advance. To be efficient, ITSP reformats the single-round communication model to a multi-round communication one between readers and tags. Furthermore, ITSP employs a cloud-based service to rapidly conduct the searching process. Extensive experimental results show that the proposed scheme achieves high-levels of searching efficiency with the improvement at least 19 %.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhang, D., Zhou, J., Guo, M., Cao, J., Li, T.: TASA: tag-free activity sensing using RFID tag arrays. IEEE Trans. Parallel Distrib. Syst. 22(4), 558–570 (2011)

    Article  Google Scholar 

  2. Tan, C.C., Sheng, B., Li, Q.: Efficient techniques for monitoring missing RFID tags. IEEE Trans. Wirel. Commun. 9(6), 1882–1889 (2010)

    Article  Google Scholar 

  3. Chen, S., Zhang, M., Xiao, B.: Efficient information collection protocols for sensor-augmented RFID networks. In: INFOCOM 2011, pp. 3101–3109 (2011)

    Google Scholar 

  4. Lee, C.-H., Chung, C.-W.: Efficient storage scheme and query processing for supply chain management using RFID. In: SIGMOD Conference, pp. 291–302 (2008)

    Google Scholar 

  5. Qiao, Y., Chen, S., Li, T., Chen, S.: Energy-efficient polling protocols in RFID systems. In: MobiHoc 2011, p. 25 (2011)

    Google Scholar 

  6. Ni, L.M., Liu, Y., Lau, Y.C., Patil, A.P.: LANDMARC: indoor location sensing using active RFID. Wirel. Netw. 10, 701–710 (2004)

    Article  Google Scholar 

  7. Chang, J.-C., Wu, H.-L., Zhang, D.: On constant-time-identification and privacy-preserving RFID protocols: trade-off between time and memory. In: UIC/ATC 2013, pp. 613–618 (2013)

    Google Scholar 

  8. Li, Y., Ding, X.: Protecting RFID communications in supply chains. In: ASIACCS 2007, pp. 234–241 (2007)

    Google Scholar 

  9. Waldrop, J., Engels, D.W., Sarma, S.E.: Colorwave: an anticollision algorithm for the reader collision problem. In: ICC 2003, pp. 1206–1210 (2003)

    Google Scholar 

  10. Zhou, Z., Gupta, H., Das, S.R., Zhu, X.: Slotted scheduled tag access in multi-reader RFID systems. In: ICNP 2007, pp. 61–70 (2007)

    Google Scholar 

  11. Tang, S., Yuan, J., Li, X.-Y., Chen, G.: RASPberry: a stable reader activation scheduling protocol in multi-reader RFID systems. In: ICNP 2009, pp. 304–313 (2009)

    Google Scholar 

  12. Yoon, W., Vaidya, N.H.: RFID reader collision problem: performance analysis and medium access. Wirel. Commun. Mob. Comput. 12(5), 420–430 (2012)

    Article  Google Scholar 

  13. Zheng, Y., Li, M.: Fast tag searching protocol for large-scale RFID systems. IEEE/ACM Trans. Netw. 21(3), 924–934 (2014)

    Article  Google Scholar 

  14. Chen, M., Luo, W., Mo, Z., Fang, Y.: An efficient tag search protocol in large-scale RFID systems. In: IEEE INFOCOM, 2014, pp. 899–907 (2014)

    Google Scholar 

  15. Chun, J.Y., Hwang, J.Y., Lee, D.H.: Privacy-enhanced RFID Tag Search System (Chapter 9). In: Preradovic, S. (ed.) Advanced Radio Frequency Identification Design and Applications. InTech, Rijeka (2011). ISBN 978-953-307-168-8

    Google Scholar 

  16. Cha, J.-R., Kim, J.-H.: Dynamic framed slotted ALOHA algorithms using fast tag estimation method for RFID system. In: IEEE CCNC, 2006, pp. 768–772 (2006)

    Google Scholar 

  17. Chen, M., Gonzalez, S., Leung, V., et al.: A 2G-RFID-based e-healthcare system. IEEE Wireless Commun.17(1), 37–43 (2010)

    Article  Google Scholar 

Download references

Acknowledgments

Dr. Zhang and Dr. Zhao are the corresponding author. This work was supported in part by the National Natural Science Foundation of China under Grant 61103185 and 61472283, the Fok YingTong Education Foundation of China under Grant 142006, the Research Funds for the Central Universities under Grant 2100219043, and the National Basic Research Program of China (973 Program) under Grant 2014CB340404.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daqiang Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Qian, Y., Zhang, D., Zhao, S., Fan, X., Fan, K. (2015). Cloud-Based Iterative RFID Tag Search Protocol Using Bloom Filters. In: Leung, V., Lai, R., Chen, M., Wan, J. (eds) Cloud Computing. CloudComp 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 142. Springer, Cham. https://doi.org/10.1007/978-3-319-16050-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-16050-4_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-16049-8

  • Online ISBN: 978-3-319-16050-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics