TY - GEN
T1 - Practical Key Tag Monitoring in RFID Systems
AU - Yu, Jihong
AU - Gong, Wei
AU - Liu, Jiangchuan
AU - Chen, Lin
AU - Wang, Fangxin
AU - Pang, Haitian
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2019/1/22
Y1 - 2019/1/22
N2 - With rapid development of radio frequency identification (RFID) technology, ever-increasing research effort has been dedicated to devising various RFID-enabled services. The key tag monitoring, which is to detect anomaly of key tags, is one of the most important services in such important Internet-of-Things applications as inventory management. Yet prior work assumes that all tags are armed with hashing functionality and a reader would report channel states in every slot, which is not supported by commercial off-the-shelf (COTS) RFID tags and readers. To bridge this gap, this paper is devoted to enabling key tag monitoring service with COTS devices. In particular, we introduce two anomaly monitoring protocols to detect whether there is any key tag absent from the system. The first protocol employs Q-query that works in an analog frame slotted Aloha paradigm to interrogate tags and collect tag IDs. An anomaly event will be found if at least one key tag ID is not present in the collected ones. To reduce time cost of the first protocol resulted from tag collisions, we present a collision-free method that uses select-query to specify a key tag to reply in each slot. Once there is no response in a slot, the specified key tag is regarded as a missing tag. We conduct experiments to evaluate two protocols.
AB - With rapid development of radio frequency identification (RFID) technology, ever-increasing research effort has been dedicated to devising various RFID-enabled services. The key tag monitoring, which is to detect anomaly of key tags, is one of the most important services in such important Internet-of-Things applications as inventory management. Yet prior work assumes that all tags are armed with hashing functionality and a reader would report channel states in every slot, which is not supported by commercial off-the-shelf (COTS) RFID tags and readers. To bridge this gap, this paper is devoted to enabling key tag monitoring service with COTS devices. In particular, we introduce two anomaly monitoring protocols to detect whether there is any key tag absent from the system. The first protocol employs Q-query that works in an analog frame slotted Aloha paradigm to interrogate tags and collect tag IDs. An anomaly event will be found if at least one key tag ID is not present in the collected ones. To reduce time cost of the first protocol resulted from tag collisions, we present a collision-free method that uses select-query to specify a key tag to reply in each slot. Once there is no response in a slot, the specified key tag is regarded as a missing tag. We conduct experiments to evaluate two protocols.
UR - http://www.scopus.com/inward/record.url?scp=85062625436&partnerID=8YFLogxK
U2 - 10.1109/IWQoS.2018.8624117
DO - 10.1109/IWQoS.2018.8624117
M3 - Conference contribution
AN - SCOPUS:85062625436
T3 - 2018 IEEE/ACM 26th International Symposium on Quality of Service, IWQoS 2018
BT - 2018 IEEE/ACM 26th International Symposium on Quality of Service, IWQoS 2018
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 26th IEEE/ACM International Symposium on Quality of Service, IWQoS 2018
Y2 - 4 June 2018 through 6 June 2018
ER -