Fast counting the key tags in anonymous RFID systems

Xiulong Liu, Keqiu Li, Heng Qi, Bin Xiao, Xin Xie

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

21 Citations (Scopus)

Abstract

In RFID-enabled applications, we may pay more attention to key tags instead of all tags. This paper studies the problem of key tag counting, which aims at estimating how many key tags in a given set exist in the current RFID system. Previous work is slow to solve this new problem because of the serious interference replies from the large number of ordinary (i.e., Nonkey) tags. However, time-efficiency is an important metric for the fast tag cardinality estimation in a large-scale RFID system. In this paper, we propose a singleton slot-based estimator, which is time-efficient because the RFID reader only needs to observe the status change of expected singleton slots of key tags instead of the whole time frame. In practice, the ratio of key tags to all current tags is small for 'key' members should be rare. As a result, even when the whole time frame is long, the expected singleton slot number is limited and the running of our protocol is fast to achieve estimation accuracy. Rigorous theoretical analysis shows that the proposed protocol can provide guaranteed estimation accuracy to end users. We conduct simulations and implement a prototype of our protocol to verify its efficiency and deployability.
Original languageEnglish
Title of host publicationProceedings - IEEE 22nd International
PublisherIEEE Computer Society
Pages59-70
Number of pages12
ISBN (Electronic)9781479962044
DOIs
Publication statusPublished - 1 Jan 2014
Event22nd IEEE International Conference on Network Protocols, ICNP 2014 - Research Triangle, United States
Duration: 21 Oct 201424 Oct 2014

Conference

Conference22nd IEEE International Conference on Network Protocols, ICNP 2014
CountryUnited States
CityResearch Triangle
Period21/10/1424/10/14

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software

Cite this