Abstract. How can a RFID (Radio Frequency Identification Devices) system prove that two or more RFID tags are in the same location? Previous researchers have proposed yoking-proof and grouping-proof techniques to address this problem -and when these turned out to be vulnerable to replay attacks, a new existence-proof technique was proposed. We critique this class of existence-proofs and show it has three problems: (a) a race condition when multiple readers are present; (b) a race condition when multiple tags are present; and (c) a problem determining the number of tags. We present two new proof techniques, a secure timestamp proof (secTS-proof) and a timestampchaining proof (chaining-proof) that avoid replay attacks and solve problems in previously proposed techniques.
Tag anticollision has long been an important issue in RFID systems. To accelerate tag identification, some researchers have recently adopted bit tracking technology that allows the reader to detect the locations of collided bits in a collision slot. However, these methods still encounter the problem of too many collisions occurring at the beginning of identification. This paper proposes an optimal query tracking tree protocol (OQTT) that tries to separate all of the tags into smaller sets to reduce collisions at the beginning of identification. Using bit tracking technology, OQTT mainly adopts three proposed approaches, bit estimation, optimal partition, and query tracking tree. Bit estimation first estimates the number of tags based on the locations of collided bits. Optimal partition then determines the optimal number of the initial sets based on this estimation. Query tracking tree splits a set of collided tags into two subsets using the first collided bit in the tag IDs. This paper analyzes the efficiency of OQTT, which represents how many tags can be identified in a slot. Results show that its efficiency is close to 0.614, the highest efficiency published to date. The simulation results further show that OQTT outperforms other existing algorithms.
Tag anti-collision has long been an important issue in RFID systems. To accelerate tag identification, some researchers have recently adopted bit tracking technology that allows the reader to detect the locations of collided bits in a collision slot. However, these methods still encounter the problem of too many collisions occurring at the beginning of identification. This paper proposes an optimal binary tracking tree protocol (OBTT) that tries to separate all of the tags into smaller sets to reduce collisions at the beginning of identification. Using bit tracking technology, OBTT mainly adopts three proposed approaches, bit estimation, optimal partition, and binary tracking tree. Bit estimation first estimates the number of tags based on the locations of collided bits. Optimal partition then determines the optimal number of the initial sets based on this estimation. Binary tracking tree lets the tag utilize one counter to achieve the split during the identification process. This paper formally analyzes the slot efficiency of OBTT, which represents how many tags can be identified in a slot. Results show that the slot efficiency is close to 0.614, the highest value published to date. Considering slot lengths, OBTT further determines the optimal number of the initial sets to minimize the identification delay. The analytical results show that the delay efficiency of OBTT achieves 0.750, where delay efficiency represents the number of tags that can be identified in a baseline slot, the length of which is the complete ID sent by the tag. The simulation results show that OBTT outperforms other existing algorithms.
Index Terms-Anti-collision, bit tracking, Manchester code, RFID, tag identification.Yuan-Cheng Lai received the Ph.D. degree in computer and information science from National Chiao Tung University, Taiwan, in 1997.He joined the faculty of Information Management, National Taiwan University of Science and Technology, Taiwan, in 2001 and has been a Professor since 2008. Now, he is a Distinguished Professor at the university. He has published over 170 research papers and six Chinese books about computer networks. His research interests include performance analysis, protocol design, wireless networks, and network security.Ling-Yen Hsiao received the B.S.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.