Abstract

In RFID systems, the privacy problem has attracted increasing attention as the tags have extremely limited on-chip resources and may blindly respond to unauthorized readers. To protect the privacy, one widely used solution is to deploy one or more blocker tags to collide the RF signal sent from protected tags all the time. In this paper, we investigate the problem of tag identification in privacy-sensitive RFID systems when we have the authorized reader(s). Due to the presence of blocker tags, the tag identification becomes more challenging since the protected tags and blocker tags will always respond concurrently, leading to unreconciled collisions. To overcome this challenge, we in this paper propose two efficient tag identification protocols IIP and SIP, which meet three application requirements: privacy, accuracy, and efficiency. IIP iteratively deactivates blocking tags as well as labeling genuine tags, and finally identifies tags by avoiding all the unreconciled collisions. On top of IIP, SIP further avoids the slot waste by carrying out a filter to separate genuine tags from others in advance. Simulation results demonstrate that our protocols are able to guarantee any identification accuracy in a time-efficient and privacy-protected way.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.