000 03672nam a22005055i 4500
001 978-3-319-47355-0
003 DE-He213
005 20200421112045.0
007 cr nn 008mamaa
008 161102s2016 gw | s |||| 0|eng d
020 _a9783319473550
_9978-3-319-47355-0
024 7 _a10.1007/978-3-319-47355-0
_2doi
050 4 _aQA76.76.A65
072 7 _aUNH
_2bicssc
072 7 _aUDBD
_2bicssc
072 7 _aCOM032000
_2bisacsh
082 0 4 _a005.7
_223
100 1 _aChen, Min.
_eauthor.
245 1 0 _aRFID Technologies for Internet of Things
_h[electronic resource] /
_cby Min Chen, Shigang Chen.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2016.
300 _aVII, 95 p. 37 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aWireless Networks,
_x2366-1186
505 0 _aIntroduction -- Efficient Tag Search in Large RFID Systems -- Lightweight Anonymous RFID Authentication -- Identifying State-Free Networked Tags.
520 _aThis book introduces applications of RFID on the Internet of things, under the emerging technologies for tag search, anonymous RFID authentication, and identification of networked tags. A new technique called filtering vector (a compact data structure that encodes tag IDs) is proposed to enable tag filtration, meeting the stringent delay requirements for real-world applications. Based on filtering vectors, a novel iterative tag search protocol is designed, which progressively improves the accuracy of search result and reduces the time of each iteration by using the information learned from the previous iterations. Moreover, the protocol is extended to work under noisy channel. The authors also make a fundamental shift from the traditional design paradigm for anonymous RFID authentication by following an asymmetry design principle that pushes most complexity to the readers while leaving the tags as simple as possible. A novel technique is developed to dynamically generate random tokens on demand for authentication. The token-based authentication protocol only requires O(1) communication overhead and online computation overhead per authentication for both readers and tags. Finally, the authors investigate the problem of networked-tag identification. The traditional contention-based protocol design will incur too much energy overhead in multihop tag systems, and a reader-coordinated design that significantly serializes tag transmissions performs much better. In addition, a solution based on serial numbers is proposed to achieve load balancing, thereby reducing the worst-case energy cost among the tags. Designed for researchers and professionals, this SpringerBrief will interest individuals who work in efficiency, security, and privacy. Advanced-level students focused on network design will also benefit from the content.
650 0 _aComputer science.
650 0 _aComputer communication systems.
650 0 _aElectrical engineering.
650 1 4 _aComputer Science.
650 2 4 _aInformation Systems Applications (incl. Internet).
650 2 4 _aCommunications Engineering, Networks.
650 2 4 _aComputer Communication Networks.
700 1 _aChen, Shigang.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319473543
830 0 _aWireless Networks,
_x2366-1186
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-47355-0
912 _aZDB-2-SCS
942 _cEBK
999 _c56887
_d56887