4.7 Article

Pinpointing Anomaly RFID Tags: Situation and Opportunities

期刊

IEEE NETWORK
卷 31, 期 6, 页码 40-47

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/MNET.2017.1700043

关键词

-

资金

  1. National Key Research and Development Program of China [2016YFB1000205]
  2. State Key Program of National Natural Science of China [61432002]
  3. NSFC [61370199, 61672379, 61373181, 61572262, 61332004]
  4. HK RGC Collaborative Research Fund (CRF) (RGC) [CityU C1008-16G]
  5. Dalian High-level Talent Innovation Program [2015R049]
  6. Fundamental Research Funds for the Central Universities [DUT15QY20]
  7. Tianjin Key Laboratory of Advanced Networking (TANK), Tianjin, China
  8. Strategic Information and Communications R&D Promotion Programme (SCOPE) [162302008]
  9. Innovation and Technology Commission of the HKSAR Government [K-BBY1]
  10. Strategic Information and Communications R&D Promotion Program (SCOPE) [162302008]

向作者/读者索取更多资源

RFID is one of the most important automatic identification techniques in the future IoT world. Compared with the other techniques, RFID has various advantages such as no requirement of line of sight, the capability of wireless communication, low cost, small size, and so on. This article discusses two types of anomaly tags, i.e., missing tags and unknown tags, which usually appear due to theft or product misplacement. Generally, there are two categories of anomaly tag pinpointing protocols: boolean detection, which aims at probabilistically determining whether there exist anomaly tags or not; and exact identification, which aims at identifying all anomaly tag IDs. This article first conducts a comprehensive survey of the existing anomaly tag pinpointing protocols, particularly emphasizing their evolution road. After that, we also conduct a taxonomy of the existing protocols and summarize their pros and cons. Finally, we discuss some technical challenges and problems that have not been covered yet, and point out the potential opportunities in RFID research and applications.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据