Using Chinese Remainder Theorem for the Grouping of RFID Tags
نویسندگان
چکیده
In this paper, we propose a novel scheme for the design of grouping of radio-frequency identification (RFID) tags, based on the Chinese remainder theorem (CRT). Grouping allows verifying the integrity of a collection of objects without the requirement for accessing external systems, and can be extended to identify missing objects. Motivated by the redundancy property of the Chinese remainder representation, we propose grouping of RFID tags by the CRT. The proposed scheme not only provides designated decoding guarantees, but also offers flexibility in constructing group generation matrices. We also characterize the key objects needed to study decoding guarantees of grouping and their extended counterpart, called rank-deficient and deadend sets, respectively, which enable theoretical analyses of error rates. The two key objects are related to the minimum and stopping distances of a linear code, respectively. As such, the characterization offers direct connection with coding theory that helps with the understanding of the verification/identification problems being studied. Theoretical and simulation results are presented, demonstrating that the proposed scheme is an efficient approach to the design of grouping of RFID tags.
منابع مشابه
A Novel Multilayered RFID Tagged Cargo Integrity Assurance Scheme
To minimize cargo theft during transport, mobile radio frequency identification (RFID) grouping proof methods are generally employed to ensure the integrity of entire cargo loads. However, conventional grouping proofs cannot simultaneously generate grouping proofs for a specific group of RFID tags. The most serious problem of these methods is that nonexistent tags are included in the grouping p...
متن کاملافزایش سرعت شناسایی در سیستمهای RFID
Radio frequency identification (RFID) is a new generation of automatic identification systems, based on wireless communication technology. In these systems all the tags using one communication channel to communicate with the reader. When two or more tags transmit their data to the reader simultaneously, their transmitted signals will collide. Resolving this collision has a direct impact on the ...
متن کاملRSPAE: RFID Search Protocol based on Authenticated Encryption
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...
متن کاملAn Anonymous Offline RFID Grouping-Proof Protocol
As more and more items are tagged with RFID (Radio Frequency Identification) tags, grouping-proof technology is widely utilized to provide a coexistence evidence for a group of related items. Due to the wireless channel used in RFID systems, a security risk exists in the communication between the reader and tags. How to ensure the tag’s information security and to generate reliable grouping-pro...
متن کاملPrivacy-Preserving ECC-Based Grouping Proofs for RFID
The concept of grouping proofs has been introduced by Juels to permit RFID tags to generate a verifiable proof that they have been scanned simultaneously, even when readers or tags are potentially untrusted. In this paper, we extend this concept and propose a narrowstrong privacy-preserving RFID grouping proof and demonstrate that it can easily be extended to use cases with more than two tags, ...
متن کامل