Mobile Networks and Applications

, Volume 20, Issue 3, pp 356–362 | Cite as

An Efficient RFID Search Protocol Based On Clouds

  • Daqiang Zhang
  • Yuming Qian
  • Jiafu WanEmail author
  • Shengjie ZhaoEmail author


In RFID applications, we may have to search a number of particular goods in a large-scale number of products. Previous work solve this problem to some extent. Firstly, they cannot work when the cardinality of X is lager than Y. Besides, they assume the reader has a powerful capacity which is adequate for computation. In this paper, we propose ITSP – Iterative Tag Search Protocol based on cloud which solves these two problems. It uses multi-rounds communication on behalf of one-round communication to make search work when |X| > |Y|. Besides the readers request cloud service to help do computation to make up its limited computation capacity. Further, we still study the security during RFID Search. To be secure, ITSP authenticates readers and tags in advance to keep secure. Experimental results show that proposed scheme achieves higher searching efficiency with the improvement at least 19 %.


RFID Cloud computing Iterative tag search protocol 



This work was supported in part by the National Natural Science Foundation of China under Grant 61472283, 61471267, 61103185 and 61262013, the Fok Ying Tong Education Foundation of China under Grant 142006, the Research Funds for the Central Universities under Grant 2100219043, and the National Basic Research Program of China (973 Program) under Grant 2014CB340404, the Open Fund of Guangdong Province Key Laboratory of Precision Equipment and Manufacturing Technology (No. PEMT1303). The corresponding authors are Dr. Jiafu Wan and Dr. Shengjie Zhao.


  1. 1.
    Yoon W, Vaidya N (2012) RFID reader collision problem: performance analysis and medium access. Wirel Commun Mob Comput 12(5):420–430CrossRefGoogle Scholar
  2. 2.
    Xia F, Asabere N, Liu H, Chen Z, Wang W (2014) Socially-aware conference participant recommendation with personality traits. IEEE Syst J. doi: 10.1109/JSYST.2014.2342375
  3. 3.
    Wang X, Chen M (2014) PreFeed: cloud-based content prefetching of feed subscriptions for mobile users. IEEE Syst J 8(1):202–207CrossRefGoogle Scholar
  4. 4.
    Taleb T, Ksentini A (2013) Follow me cloud: interworking federated clouds & distributed mobile networks. IEEE Network Magazine 27(5):12–19CrossRefGoogle Scholar
  5. 5.
    Chen M, Wen Y, Jin H, Leung V (2013) Cloud-assisted mobile computing and pervasive services. IEEE Netw 27(5):4–5CrossRefGoogle Scholar
  6. 6.
    Zhang D, Wan J, Liu Q, Guan X, Liang X (2012) A taxonomy of agent technologies for ubiquitous computing environments. KSII Transactions on Internet and Information Systems 6(2):547–565zbMATHGoogle Scholar
  7. 7.
    Chen M, Wen Y, Jin H, Leung V (2013) Enabling technologies for future data center networking: a primer. IEEE Netw 27(4):8–15CrossRefGoogle Scholar
  8. 8.
    Pirozmand P, Wu G, Jedari B, Xia F (2014) Human mobility in opportunistic networks: characteristics, models and prediction methods. J Netw Comput Appl 42(5):45–58CrossRefGoogle Scholar
  9. 9.
    Anastasopoulos M, Taleb T, Obaidat M, Cottis P (2012) Feedback suppression in multicast satellite networks using game theory. IEEE Syst J 6(4):657–666CrossRefGoogle Scholar
  10. 10.
    Wan J, Zhang D, Zhao S, Yang L, Lloret J (2014) Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutionsy. IEEE Commun Mag 52(8):106–113CrossRefGoogle Scholar
  11. 11.
    Mell P, Grance T (2011). The NIST definition of cloud computing. U.S. Department of CommerceGoogle Scholar
  12. 12.
    Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. Journal of internet services and applications 1(1):7–18CrossRefGoogle Scholar
  13. 13.
    Armbrust M, Fox A, Griffith R, et al. (2010) A view of cloud computing. Commun ACM 53(4):50–58CrossRefGoogle Scholar
  14. 14.
    Zhang D, Xiong H, Hsu C, Vasilakos A (2014) BASA: building mobile ad-hoc social networks on top of android. IEEE Netw 28(1):4–9CrossRefGoogle Scholar
  15. 15.
    Zhang D, Zhou J, Guo M, Cao J, Li T (2011) TASA: tag-free activity sensing using RFID tag arrays. IEEE Transactions on Parallel and Distributed Systems 22(4):558–570CrossRefGoogle Scholar
  16. 16.
    Saygin C (2007) Adaptive inventory management using RFID data. Int J Adv Manuf Technol 32(9–10):1045–1051CrossRefGoogle Scholar
  17. 17.
    Zhang D, Yang L, Chen M, Zhao S, Guo M, Zhang Y (2014) Real-time locating systems using active RFID for internet of things. IEEE Syst J. doi: 10.1109/JSYST.2014.2346625
  18. 18.
    Kim H, Sohn S (2009) Cost of ownership model for the RFID logistics system applicable to u-city. Eur J Oper Res 194(2):406–417CrossRefzbMATHGoogle Scholar
  19. 19.
    Ryumduck O, Park J (2008) A development of active monitoring system for intelligent RFID logistics processing environment. ALPIT’08 2008 International Conference on Advanced Language Processing and Web Information Technology, pp 358–361Google Scholar
  20. 20.
    Kim S, Kim D, Park H (2010) Animal situation tracking service using RFID, GPS, and sensors. 2010 Second International Conference on Computer and Network Technology (ICCNT), pp 153–156Google Scholar
  21. 21.
    Weinstein R (2005) RFID: a technical overview and its application to the enterprise. IT Prof 7(3):27–33CrossRefGoogle Scholar
  22. 22.
    Michael K, McCathie L (2005) The pros and cons of RFID in supply chain management. ICMB 2005 International Conference on Mobile Business, pp 623–629Google Scholar
  23. 23.
    Gebbers R, Adamchuk V (2010) Precision agriculture and food security. Science 327(5967):828–831CrossRefGoogle Scholar
  24. 24.
    Yu S (2007) RFID implementation and benefits in libraries. Electron Libr 25(1):54–64CrossRefGoogle Scholar
  25. 25.
    Zheng Y, Li M (2013) Fast tag searching protocol for large-scale RFID systems. IEEE/ACM Trans Networking 21(3):924–934CrossRefGoogle Scholar
  26. 26.
    Chen M, Luo W, Mo Z, Chen S, Fang Y (2013) An efficient tag search protocol in large-scale RFID systems. Proceedings of the 2013 IEEE INFOCOM:899–907Google Scholar
  27. 27.
    Zhou Z, Gupta H, Das S, Zhu X (2007) Slotted scheduled tag access in multi-reader RFID systems. ICNP 2007 IEEE International Conference on Network Protocols, pp 61–70Google Scholar
  28. 28.
    Tang S, Wang C, Li M, Jiang C (2011) Reader activation scheduling in multi-reader RFID systems: a study of general case. 2011 IEEE International on Parallel & Distributed Processing Symposium (IPDPS), pp 1147–1155Google Scholar
  29. 29.
    Chun J, Hwang J, Lee D (2011) Privacy-enhanced RFID tag search system. INTECH Open Access PublisherGoogle Scholar
  30. 30.
    Juels A (2006) RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications 24(2):381–394CrossRefMathSciNetGoogle Scholar
  31. 31.
    Broder A, Mitzenmacher M (2004) Network applications of bloom filters: a survey. Internet Math 1(4):485–509CrossRefzbMATHMathSciNetGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  1. 1.School of Software EngineeringTongji UniversityShanghaiChina
  2. 2.School of Mechanical and Automotive EngineeringSouth China University of TechnologyGuangzhouChina
  3. 3.The Key Lab of Embedded System and Service Computing, Ministry of EducationTongji UniversityShanghaiChina

Personalised recommendations