Skip to main content
Log in

An Efficient RFID Search Protocol Based On Clouds

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

In RFID applications, we may have to search a number of particular goods in a large-scale number of products. Previous work solve this problem to some extent. Firstly, they cannot work when the cardinality of X is lager than Y. Besides, they assume the reader has a powerful capacity which is adequate for computation. In this paper, we propose ITSP – Iterative Tag Search Protocol based on cloud which solves these two problems. It uses multi-rounds communication on behalf of one-round communication to make search work when |X| > |Y|. Besides the readers request cloud service to help do computation to make up its limited computation capacity. Further, we still study the security during RFID Search. To be secure, ITSP authenticates readers and tags in advance to keep secure. Experimental results show that proposed scheme achieves higher searching efficiency with the improvement at least 19 %.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Yoon W, Vaidya N (2012) RFID reader collision problem: performance analysis and medium access. Wirel Commun Mob Comput 12(5):420–430

    Article  Google Scholar 

  2. Xia F, Asabere N, Liu H, Chen Z, Wang W (2014) Socially-aware conference participant recommendation with personality traits. IEEE Syst J. doi:10.1109/JSYST.2014.2342375

  3. Wang X, Chen M (2014) PreFeed: cloud-based content prefetching of feed subscriptions for mobile users. IEEE Syst J 8(1):202–207

    Article  Google Scholar 

  4. Taleb T, Ksentini A (2013) Follow me cloud: interworking federated clouds & distributed mobile networks. IEEE Network Magazine 27(5):12–19

    Article  Google Scholar 

  5. Chen M, Wen Y, Jin H, Leung V (2013) Cloud-assisted mobile computing and pervasive services. IEEE Netw 27(5):4–5

    Article  Google Scholar 

  6. Zhang D, Wan J, Liu Q, Guan X, Liang X (2012) A taxonomy of agent technologies for ubiquitous computing environments. KSII Transactions on Internet and Information Systems 6(2):547–565

    MATH  Google Scholar 

  7. Chen M, Wen Y, Jin H, Leung V (2013) Enabling technologies for future data center networking: a primer. IEEE Netw 27(4):8–15

    Article  Google Scholar 

  8. Pirozmand P, Wu G, Jedari B, Xia F (2014) Human mobility in opportunistic networks: characteristics, models and prediction methods. J Netw Comput Appl 42(5):45–58

    Article  Google Scholar 

  9. Anastasopoulos M, Taleb T, Obaidat M, Cottis P (2012) Feedback suppression in multicast satellite networks using game theory. IEEE Syst J 6(4):657–666

    Article  Google Scholar 

  10. Wan J, Zhang D, Zhao S, Yang L, Lloret J (2014) Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutionsy. IEEE Commun Mag 52(8):106–113

    Article  Google Scholar 

  11. Mell P, Grance T (2011). The NIST definition of cloud computing. U.S. Department of Commerce

  12. Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. Journal of internet services and applications 1(1):7–18

    Article  Google Scholar 

  13. Armbrust M, Fox A, Griffith R, et al. (2010) A view of cloud computing. Commun ACM 53(4):50–58

    Article  Google Scholar 

  14. Zhang D, Xiong H, Hsu C, Vasilakos A (2014) BASA: building mobile ad-hoc social networks on top of android. IEEE Netw 28(1):4–9

    Article  Google Scholar 

  15. Zhang D, Zhou J, Guo M, Cao J, Li T (2011) TASA: tag-free activity sensing using RFID tag arrays. IEEE Transactions on Parallel and Distributed Systems 22(4):558–570

    Article  Google Scholar 

  16. Saygin C (2007) Adaptive inventory management using RFID data. Int J Adv Manuf Technol 32(9–10):1045–1051

    Article  Google Scholar 

  17. Zhang D, Yang L, Chen M, Zhao S, Guo M, Zhang Y (2014) Real-time locating systems using active RFID for internet of things. IEEE Syst J. doi:10.1109/JSYST.2014.2346625

  18. Kim H, Sohn S (2009) Cost of ownership model for the RFID logistics system applicable to u-city. Eur J Oper Res 194(2):406–417

    Article  MATH  Google Scholar 

  19. Ryumduck O, Park J (2008) A development of active monitoring system for intelligent RFID logistics processing environment. ALPIT’08 2008 International Conference on Advanced Language Processing and Web Information Technology, pp 358–361

  20. Kim S, Kim D, Park H (2010) Animal situation tracking service using RFID, GPS, and sensors. 2010 Second International Conference on Computer and Network Technology (ICCNT), pp 153–156

  21. Weinstein R (2005) RFID: a technical overview and its application to the enterprise. IT Prof 7(3):27–33

    Article  Google Scholar 

  22. Michael K, McCathie L (2005) The pros and cons of RFID in supply chain management. ICMB 2005 International Conference on Mobile Business, pp 623–629

  23. Gebbers R, Adamchuk V (2010) Precision agriculture and food security. Science 327(5967):828–831

    Article  Google Scholar 

  24. Yu S (2007) RFID implementation and benefits in libraries. Electron Libr 25(1):54–64

    Article  Google Scholar 

  25. Zheng Y, Li M (2013) Fast tag searching protocol for large-scale RFID systems. IEEE/ACM Trans Networking 21(3):924–934

    Article  Google Scholar 

  26. Chen M, Luo W, Mo Z, Chen S, Fang Y (2013) An efficient tag search protocol in large-scale RFID systems. Proceedings of the 2013 IEEE INFOCOM:899–907

  27. Zhou Z, Gupta H, Das S, Zhu X (2007) Slotted scheduled tag access in multi-reader RFID systems. ICNP 2007 IEEE International Conference on Network Protocols, pp 61–70

  28. Tang S, Wang C, Li M, Jiang C (2011) Reader activation scheduling in multi-reader RFID systems: a study of general case. 2011 IEEE International on Parallel & Distributed Processing Symposium (IPDPS), pp 1147–1155

  29. Chun J, Hwang J, Lee D (2011) Privacy-enhanced RFID tag search system. INTECH Open Access Publisher

  30. Juels A (2006) RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications 24(2):381–394

    Article  MathSciNet  Google Scholar 

  31. Broder A, Mitzenmacher M (2004) Network applications of bloom filters: a survey. Internet Math 1(4):485–509

    Article  MATH  MathSciNet  Google Scholar 

Download references

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China under Grant 61472283, 61471267, 61103185 and 61262013, the Fok Ying Tong Education Foundation of China under Grant 142006, the Research Funds for the Central Universities under Grant 2100219043, and the National Basic Research Program of China (973 Program) under Grant 2014CB340404, the Open Fund of Guangdong Province Key Laboratory of Precision Equipment and Manufacturing Technology (No. PEMT1303). The corresponding authors are Dr. Jiafu Wan and Dr. Shengjie Zhao.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jiafu Wan or Shengjie Zhao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, D., Qian, Y., Wan, J. et al. An Efficient RFID Search Protocol Based On Clouds. Mobile Netw Appl 20, 356–362 (2015). https://doi.org/10.1007/s11036-015-0597-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-015-0597-0

Keywords

Navigation