Cargando…

RFID Technologies for Internet of Things

This book introduces applications of RFID on the Internet of things, under the emerging technologies for tag search, anonymous RFID authentication, and identification of networked tags. A new technique called filtering vector (a compact data structure that encodes tag IDs) is proposed to enable tag...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Chen, Min (Autor), Chen, Shigang (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2016.
Edición:1st ed. 2016.
Colección:Wireless Networks,
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-319-47355-0
003 DE-He213
005 20220120225802.0
007 cr nn 008mamaa
008 161102s2016 sz | s |||| 0|eng d
020 |a 9783319473550  |9 978-3-319-47355-0 
024 7 |a 10.1007/978-3-319-47355-0  |2 doi 
050 4 |a QA76.76.A65 
072 7 |a UB  |2 bicssc 
072 7 |a COM032000  |2 bisacsh 
072 7 |a UX  |2 thema 
082 0 4 |a 005.3  |2 23 
100 1 |a Chen, Min.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a RFID Technologies for Internet of Things  |h [electronic resource] /  |c by Min Chen, Shigang Chen. 
250 |a 1st ed. 2016. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2016. 
300 |a VII, 95 p. 37 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Wireless Networks,  |x 2366-1445 
505 0 |a Introduction -- Efficient Tag Search in Large RFID Systems -- Lightweight Anonymous RFID Authentication -- Identifying State-Free Networked Tags. 
520 |a This book introduces applications of RFID on the Internet of things, under the emerging technologies for tag search, anonymous RFID authentication, and identification of networked tags. A new technique called filtering vector (a compact data structure that encodes tag IDs) is proposed to enable tag filtration, meeting the stringent delay requirements for real-world applications. Based on filtering vectors, a novel iterative tag search protocol is designed, which progressively improves the accuracy of search result and reduces the time of each iteration by using the information learned from the previous iterations. Moreover, the protocol is extended to work under noisy channel. The authors also make a fundamental shift from the traditional design paradigm for anonymous RFID authentication by following an asymmetry design principle that pushes most complexity to the readers while leaving the tags as simple as possible. A novel technique is developed to dynamically generate random tokens on demand for authentication. The token-based authentication protocol only requires O(1) communication overhead and online computation overhead per authentication for both readers and tags. Finally, the authors investigate the problem of networked-tag identification. The traditional contention-based protocol design will incur too much energy overhead in multihop tag systems, and a reader-coordinated design that significantly serializes tag transmissions performs much better. In addition, a solution based on serial numbers is proposed to achieve load balancing, thereby reducing the worst-case energy cost among the tags. Designed for researchers and professionals, this SpringerBrief will interest individuals who work in efficiency, security, and privacy. Advanced-level students focused on network design will also benefit from the content. 
650 0 |a Application software. 
650 0 |a Telecommunication. 
650 0 |a Computer networks . 
650 1 4 |a Computer and Information Systems Applications. 
650 2 4 |a Communications Engineering, Networks. 
650 2 4 |a Computer Communication Networks. 
700 1 |a Chen, Shigang.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783319473543 
776 0 8 |i Printed edition:  |z 9783319473567 
776 0 8 |i Printed edition:  |z 9783319837185 
830 0 |a Wireless Networks,  |x 2366-1445 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-319-47355-0  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)