RFID Technologies for Internet of Things

Nonfiction, Science & Nature, Technology, Telecommunications, Computers, Advanced Computing, Information Technology, General Computing
Cover of the book RFID Technologies for Internet of Things by Min Chen, Shigang Chen, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Min Chen, Shigang Chen ISBN: 9783319473550
Publisher: Springer International Publishing Publication: November 2, 2016
Imprint: Springer Language: English
Author: Min Chen, Shigang Chen
ISBN: 9783319473550
Publisher: Springer International Publishing
Publication: November 2, 2016
Imprint: Springer
Language: English

This book introduces applications of RFID on the Internet of things, under the emerging technologies for tag search, anonymous RFID authentication, and identification of networked tags. A new technique called filtering vector (a compact data structure that encodes tag IDs) is proposed to enable tag filtration, meeting the stringent delay requirements for real-world applications. Based on filtering vectors, a novel iterative tag search protocol is designed, which progressively improves the accuracy of search result and reduces the time of each iteration by using the information learned from the previous iterations. Moreover, the protocol is extended to work under noisy channel.

The authors also make a fundamental shift from the traditional design paradigm for anonymous RFID authentication by following an asymmetry design principle that pushes most complexity to the readers while leaving the tags as simple as possible. A novel technique is developed to dynamically generate random tokens on demand for authentication. The token-based authentication protocol only requires O(1) communication overhead and online computation overhead per authentication for both readers and tags.

Finally, the authors investigate the problem of networked-tag identification. The traditional contention-based protocol design will incur too much energy overhead in multihop tag systems, and a reader-coordinated design that significantly serializes tag transmissions performs much better. In addition, a solution based on serial numbers is proposed to achieve load balancing, thereby reducing the worst-case energy cost among the tags.

Designed for researchers and professionals, this SpringerBrief will interest individuals who work in efficiency, security, and privacy. Advanced-level students focused on network design will also benefit from the content.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book introduces applications of RFID on the Internet of things, under the emerging technologies for tag search, anonymous RFID authentication, and identification of networked tags. A new technique called filtering vector (a compact data structure that encodes tag IDs) is proposed to enable tag filtration, meeting the stringent delay requirements for real-world applications. Based on filtering vectors, a novel iterative tag search protocol is designed, which progressively improves the accuracy of search result and reduces the time of each iteration by using the information learned from the previous iterations. Moreover, the protocol is extended to work under noisy channel.

The authors also make a fundamental shift from the traditional design paradigm for anonymous RFID authentication by following an asymmetry design principle that pushes most complexity to the readers while leaving the tags as simple as possible. A novel technique is developed to dynamically generate random tokens on demand for authentication. The token-based authentication protocol only requires O(1) communication overhead and online computation overhead per authentication for both readers and tags.

Finally, the authors investigate the problem of networked-tag identification. The traditional contention-based protocol design will incur too much energy overhead in multihop tag systems, and a reader-coordinated design that significantly serializes tag transmissions performs much better. In addition, a solution based on serial numbers is proposed to achieve load balancing, thereby reducing the worst-case energy cost among the tags.

Designed for researchers and professionals, this SpringerBrief will interest individuals who work in efficiency, security, and privacy. Advanced-level students focused on network design will also benefit from the content.

More books from Springer International Publishing

Cover of the book The Cooperative Enterprise by Min Chen, Shigang Chen
Cover of the book Learning and Collaboration Technologies. Learning and Teaching by Min Chen, Shigang Chen
Cover of the book Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets by Min Chen, Shigang Chen
Cover of the book Hybrid ADCs, Smart Sensors for the IoT, and Sub-1V & Advanced Node Analog Circuit Design by Min Chen, Shigang Chen
Cover of the book Crowdsourcing of Sensor Cloud Services by Min Chen, Shigang Chen
Cover of the book Grapevine Yellows Diseases and Their Phytoplasma Agents by Min Chen, Shigang Chen
Cover of the book Dependable Software Engineering: Theories, Tools, and Applications by Min Chen, Shigang Chen
Cover of the book Theory of Innovation by Min Chen, Shigang Chen
Cover of the book Bioactive Sphingolipids in Cancer Biology and Therapy by Min Chen, Shigang Chen
Cover of the book Early Analytic Philosophy - New Perspectives on the Tradition by Min Chen, Shigang Chen
Cover of the book Real-World Wireless Sensor Networks by Min Chen, Shigang Chen
Cover of the book Advanced Interfacing Techniques for Sensors by Min Chen, Shigang Chen
Cover of the book Exploring Robotics with ROBOTIS Systems by Min Chen, Shigang Chen
Cover of the book Country Experiences in Economic Development, Management and Entrepreneurship by Min Chen, Shigang Chen
Cover of the book Equestrian Cultures in Global and Local Contexts by Min Chen, Shigang Chen
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy