Access Restriction

Author Tan, Chiu C. ♦ Sheng, Bo ♦ Li, Qun
Source CiteSeerX
Content type Text
File Format PDF
Subject Domain (in DDC) Computer science, information & general works ♦ Data processing & computer science
Subject Keyword Monitoring Missing Rfid Tag ♦ Efficient Technique ♦ Rfid Tag ♦ Trusted Reader ♦ Index Term Authentication ♦ Untrusted Reader ♦ Monitoring Protocol ♦ New Approach ♦ Traditional Research
Abstract Abstract—As RFID tags become more widespread, new approaches for managing larger numbers of RFID tags will be needed. In this paper, we consider the problem of how to accurately and efficiently monitor a set of RFID tags for missing tags. Our approach accurately monitors a set of tags without collecting IDs from them. It differs from traditional research which focuses on faster ways for collecting IDs from every tag. We present two monitoring protocols, one designed for a trusted reader and the other for an untrusted reader. Index Terms—Authentication, privacy, RFID, search, security. I.
Educational Role Student ♦ Teacher
Age Range above 22 year
Educational Use Research
Education Level UG and PG ♦ Career/Technical Study