Sign up
Forgot password?
FAQ: Login

Liu Alex X. et al. RFID Protocol Design, Optimization, and Security for the Internet of Things

  • pdf file
  • size 9,46 MB
  • added by
  • info modified
Liu Alex X. et al. RFID Protocol Design, Optimization, and Security for the Internet of Things
London, UK: The Institution of Engineering and Technology, 2018. — ISBN: 978-1-78561-333-3.
RFID systems are being increasingly used in various applications such as supply chain management, indoor localization, 3D positioning, object tracking, inventory control, electronic toll collection, and access control. For example,Walmart has started to use RFID tags to track jeans and underwear for better inventory control. Large warehouses, such as those of Amazon with sizes up to 1 million ft2, or distribution centers with sizes up to 3 million ft2, contain hundreds of thousands of items. RFID systems can make the inventory management and tracking in these large warehouses and distribution centers much easier and error free.
In this book, the authors aim to demystify complicated RFID protocols and explain in depth the principles, techniques, and practices in designing and optimizing them.
RFID identification — design and optimization
Related work
Optimal tree hopping
Minimizing identification time
Discussion
Performance comparison
RFID identification — fairness
Related work
Optimal frame size
Experimental results
RFID estimation — design and optimization
Related work
ART — scheme overview
ART — estimation algorithm
ART — parameter tuning
ART — practical considerations
ART — analysis
Performance evaluation
RFID estimation — impact of blocker tags
REB protocol
Parameter optimization
Performance evaluation
Related work
RFID detection — missing tags
Related work
System model
Protocol for detection: RUND
Parameter optimization: RUND
Protocol for identification: RUNI
Parameter optimization: RUNI
Performance evaluation
RFID detection — unknown tags
Related work
Preliminary
A sampling bloom filter-based unknown tag detection protocol
Performance evaluation
RFID queries — single category
Related work
System model
RFID tag search protocol
Parameter optimization
Performance evaluation
RFID queries — multiple cat
The basic protocol: TKQ
The supplementary protocol: SPH
Related work
Performance evaluation
RFID privacy and authentication protocols
Premier RFID authentication and privacy protocols
RFID privacy devices
RFID protocols based on hash functions
Other RFID authentication and privacy protocols
  • Sign up or login using form at top of the page to download this file.
  • Sign up
Up