4.5 Article

RFID Estimation With Blocker Tags

Journal

IEEE-ACM TRANSACTIONS ON NETWORKING
Volume 25, Issue 1, Pages 224-237

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TNET.2016.2595571

Keywords

RFID estimation; RFID privacy; blocker tags

Funding

  1. National Key Research and Development Program of China [2016YFB1000205]
  2. National Science Foundation for Distinguished Young Scholars of China [61225010]
  3. State Key Program of National Natural Science of China [61432002]
  4. NSFC [61472184, 61321491, 61272417, 61300189, 61370199]
  5. Specialized Research Fund for the Doctoral Program of Higher Education [20130041110019]
  6. Fundamental Research Funds for the Central Universities [DUT15QY20]
  7. Tianjin Key Laboratory of Advanced Networking (TANK), Tianjin, China
  8. Jiangsu Future Internet Program [BY2013095-4-08]
  9. Jiangsu High-level Innovation and Entrepreneurship (Shuangchuang) Program
  10. NSF [CNS 1449860, CNS 1461932, CNS 1460971, CNS 1439672, CNS 1301774, ECCS 1231461]

Ask authors/readers for more resources

With the increasing popularization of radio frequency identification (RFID) technology in the retail and logistics industry, RFID privacy concern has attracted much attention, because a tag responds to queries from readers no matter they are authorized or not. An effective solution is to use a commercially available blocker tag that behaves as if a set of tags with known blocking IDs are present. However, the use of blocker tags makes the classical RFID estimation problem much more challenging, as some genuine tag IDs are covered by the blocker tag and some are not. In this paper, we propose RFID estimation scheme with blocker tags (REB), the first RFID estimation scheme with the presence of blocker tags. REB uses the framed slotted Aloha protocol specified in the EPC C1G2 standard. For each round of the Aloha protocol, REB first executes the protocol on the genuine tags and the blocker tag, and then virtually executes the protocol on the known blocking IDs using the same Aloha protocol parameters. REB conducts statistical inference from the two sets of responses and estimates the number of genuine tags. Rigorous theoretical analysis of parameter settings is proposed to guarantee the required estimation accuracy, meanwhile minimizing the time cost and energy cost of REB. We also reveal a fundamental tradeoff between the time cost and energy cost of REB, which can be flexibly adjusted by the users according to the practical requirements. Extensive experimental results reveal that REB significantly outperforms the state-of-the-art identification protocols in terms of both time efficiency and energy efficiency.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available