Abstract
The widely used RFID tags impose serious privacy concerns as a tag responds to queries from readers no matter they are authorized or not. The common solution is to use a commercially available blocker tag which behaves as if a set of tags with known blocking IDs are present. The use of blocker tags makes RFID estimation much more challenging as some genuine tag IDs are covered by the blocker tag and some are not. In this paper, we propose REB, the first RFID estimation scheme with the presence of blocker tags. REB uses the framed slotted Aloha protocol specified in the C1G2 standard. For each round of the Aloha protocol, REB first executes the protocol on the genuine tags and the blocker tag, and then virtually executes the protocol on the known blocking IDs using the same Aloha protocol parameters. The basic idea of REB is to conduct statistically inference from the two sets of responses and estimate the number of genuine tags. We conduct extensive simulations to evaluate the performance of REB, in terms of time-efficiency and estimation reliability. The experimental results reveal that our REB scheme runs tens of times faster than the fastest identification protocol with the same accuracy requirement.
Original language | English |
---|---|
Title of host publication | 2015 IEEE Conference on Computer Communications, IEEE INFOCOM 2015 |
Publisher | IEEE |
Pages | 1679-1687 |
Number of pages | 9 |
Volume | 26 |
ISBN (Electronic) | 9781479983810 |
DOIs | |
Publication status | Published - 21 Aug 2015 |
Event | 34th IEEE Annual Conference on Computer Communications and Networks, IEEE INFOCOM 2015 - Hong Kong, Hong Kong Duration: 26 Apr 2015 → 1 May 2015 |
Conference
Conference | 34th IEEE Annual Conference on Computer Communications and Networks, IEEE INFOCOM 2015 |
---|---|
Country/Territory | Hong Kong |
City | Hong Kong |
Period | 26/04/15 → 1/05/15 |
Keywords
- Blocker Tags
- RFID Estimation
- RFID Privacy
ASJC Scopus subject areas
- Computer Science(all)
- Electrical and Electronic Engineering