An Efficient RFID Search Protocol Based On Clouds
- 375 Downloads
In RFID applications, we may have to search a number of particular goods in a large-scale number of products. Previous work solve this problem to some extent. Firstly, they cannot work when the cardinality of X is lager than Y. Besides, they assume the reader has a powerful capacity which is adequate for computation. In this paper, we propose ITSP – Iterative Tag Search Protocol based on cloud which solves these two problems. It uses multi-rounds communication on behalf of one-round communication to make search work when |X| > |Y|. Besides the readers request cloud service to help do computation to make up its limited computation capacity. Further, we still study the security during RFID Search. To be secure, ITSP authenticates readers and tags in advance to keep secure. Experimental results show that proposed scheme achieves higher searching efficiency with the improvement at least 19 %.
KeywordsRFID Cloud computing Iterative tag search protocol
This work was supported in part by the National Natural Science Foundation of China under Grant 61472283, 61471267, 61103185 and 61262013, the Fok Ying Tong Education Foundation of China under Grant 142006, the Research Funds for the Central Universities under Grant 2100219043, and the National Basic Research Program of China (973 Program) under Grant 2014CB340404, the Open Fund of Guangdong Province Key Laboratory of Precision Equipment and Manufacturing Technology (No. PEMT1303). The corresponding authors are Dr. Jiafu Wan and Dr. Shengjie Zhao.
- 2.Xia F, Asabere N, Liu H, Chen Z, Wang W (2014) Socially-aware conference participant recommendation with personality traits. IEEE Syst J. doi: 10.1109/JSYST.2014.2342375
- 11.Mell P, Grance T (2011). The NIST definition of cloud computing. U.S. Department of CommerceGoogle Scholar
- 17.Zhang D, Yang L, Chen M, Zhao S, Guo M, Zhang Y (2014) Real-time locating systems using active RFID for internet of things. IEEE Syst J. doi: 10.1109/JSYST.2014.2346625
- 19.Ryumduck O, Park J (2008) A development of active monitoring system for intelligent RFID logistics processing environment. ALPIT’08 2008 International Conference on Advanced Language Processing and Web Information Technology, pp 358–361Google Scholar
- 20.Kim S, Kim D, Park H (2010) Animal situation tracking service using RFID, GPS, and sensors. 2010 Second International Conference on Computer and Network Technology (ICCNT), pp 153–156Google Scholar
- 22.Michael K, McCathie L (2005) The pros and cons of RFID in supply chain management. ICMB 2005 International Conference on Mobile Business, pp 623–629Google Scholar
- 26.Chen M, Luo W, Mo Z, Chen S, Fang Y (2013) An efficient tag search protocol in large-scale RFID systems. Proceedings of the 2013 IEEE INFOCOM:899–907Google Scholar
- 27.Zhou Z, Gupta H, Das S, Zhu X (2007) Slotted scheduled tag access in multi-reader RFID systems. ICNP 2007 IEEE International Conference on Network Protocols, pp 61–70Google Scholar
- 28.Tang S, Wang C, Li M, Jiang C (2011) Reader activation scheduling in multi-reader RFID systems: a study of general case. 2011 IEEE International on Parallel & Distributed Processing Symposium (IPDPS), pp 1147–1155Google Scholar
- 29.Chun J, Hwang J, Lee D (2011) Privacy-enhanced RFID tag search system. INTECH Open Access PublisherGoogle Scholar