Check out the Rules: Towards Time-Efficient Rule Checking over RFID Tags
نویسندگان
چکیده
With the rapid proliferation of RFID technologies, RFID has been introduced to the applications like safety inspection and warehouse management. Conventionally a number of deployment rules are specified for these applications. This paper studies a practically important problem of rule checking over RFID tags, i.e., checking whether the specified rules are satisfied according to the RFID tags within the monitoring area. This rule checking function may need to be executed frequently over a large number of tags and therefore should be made efficient in terms of execution time. Aiming to achieve time efficiency, we respectively propose two protocols, CRCP and ECRCP. CRCP works based on collision detection, while ECRCP combines the collision detection and the logical features of the rules. Simulation results indicate that our protocols achieve much better performance than other solutions in terms of time efficiency.
منابع مشابه
CHECK THE DATE: Reader Revocation in PKI-Based RFID Systems
One prominent open problem with RFID tags that support public key cryptography is revocation of reader certificates. This is an important issue considering that highend RFID tags are geared for public key applications such as e-documents and contactless payment instruments. Furthermore, the problem is unique to public key-based RFID systems, since tags have no clock and thus cannot use traditio...
متن کاملImplementing RFID Automation into a Small Scale Aircraft Maintenance System
The purpose of this study was to explore and identify where technology automation could be used to reduce time and wasted labor in aircraft inventory and maintenance processes. The research used passive RFID AutoID technology due to its capabilities in data logging and relatively hands-off, passive use. The Purdue University’s aircraft maintenance system operates under old time card systems wit...
متن کاملReal-Time Event Handling in an RFID Middleware System
Radio Frequency IDentification (RFID) tags have emerged as a key technology for real-time asset tracking. Wide application of RFID leads to huge amounts of data being generated from scan of each of these RFID tags on individual items, for example, the RFID system of a moderate size retail chain will generate 300 million RFID scans per day. Extracting meaningful information out of this huge amou...
متن کاملReaders Behaving Badly - Reader Revocation in PKI-Based RFID Systems
Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and payment instruments. In this context, public key certificates form the cornerstone of the overall system security. In this paper, we argue that one of the prominent -and still woefully unaddressedchallenges is how to handle re...
متن کاملAn RSN Tool : A Test Dataset Generator for Evaluating RFID Middleware
Evaluation of RFID middleware is a complex process due to its cost for constructing a test bed involving RFID readers and tags. An input dataset of the RFID middleware is a tag event stream from connected readers. A randomly generated dataset can be considered for stress testing, but this cannot guarantee whether the middleware can provide correct answers on given dataset. To enable this, the d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- MONET
دوره 19 شماره
صفحات -
تاریخ انتشار 2014