Journal
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
Volume 9, Issue 6, Pages 1882-1889Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TWC.2010.06.081301
Keywords
Authentication; privacy; RFID; search; security
Funding
- US National Science Foundation [CNS-0721443, CNS-0831904, CNS-0747108]
- Direct For Computer & Info Scie & Enginr [0831904, 0747108] Funding Source: National Science Foundation
Ask authors/readers for more resources
As RFID tags become more widespread, new approaches for managing larger numbers of RFID tags will be needed. In this paper, we consider the problem of how to accurately and efficiently monitor a set of RFID tags for missing tags. Our approach accurately monitors a set of tags without collecting IDs from them. It differs from traditional research which focuses on faster ways for collecting IDs from every tag. We present two monitoring protocols, one designed for a trusted reader and the other for an untrusted reader.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available