Abstract
In real time process, tracking of objects allows an agency to record, track, and examine an object and these features enhance the public service through better on-time performance and quicker response time for emergency. Radio-frequency identification (RFID) method is proposed to address the problem of security for automatically identifying and tracking tags attached to objects and to transfer data it is a wireless non-contact radio-frequency electromagnetic fields. Moreover, along with Performance Enhancement with Improved Security approach the new RFID method is established for enhancing the performance as well as guaranteeing security features and the components of a typical RFID method comprises RFID reader, RFID tag, backend system, and the cluster head. The tag is entrenched in the tracked object and it does not need to be within line of sight of the reader like a barcode. Moreover, SECF method is to apply secure RFID method and increase the efficiency in tracking of objects with improved security.
Similar content being viewed by others
References
Wang, B., & Ma, M. (2012). A server independent authentication scheme for RFID systems. IEEE Transactions on Industrial Informatics, 8, 689–696.
Garfinkel, S. L., Juels, A., & Pappu, R. (2005). RFID privacy: An overview of problems and proposed solutions. IEEE Security Privacy, 3, 34–43.
Tan, C. C., Sheng, B., & Li, Q. (2008). Secure and serverless RFID authentication and search protocols. IEEE Transactions on Wireless Communications, 7, 1400–1407.
Qian, C., Liu, Y., Ngan, H., & Ni, L. M. (2008). ASAP: Scalable collision arbitration for large RFID systems. IEEE Transactions on Parallel and Distributed Systems, 24, 1277–1288.
Bonuccelli, M. A., Lonetti, F., & Martelli, F. (2007). Tree slotted ALOHA: A new protocol for tag identification in RFID networks. Elsevier Ad Hoc Networks.
Konstantinou, N. (2012). Expowave: An RFID anti-collision algorithm for dense and lively environments. IEEE Transactions on Communications, 60, 352–356.
Thiesse, F., Fleisch, E., & Dierkes, M. (2006). Lot track: RFID-based process control in the semiconductor industry. IEEE Pervasive Computing, 5(1), 47–53.
Bu, K., Xiao, B., Xiao, Q., & Chen, S. (2012). Efficient misplaced-tag pinpointing in large RFID systems. IEEE Transactions on Parallel and Distributed Systems, 23, 2094–2106.
Tan, C., Sheng, B., & Li, Q. (2010). Efficient techniques for monitoring missing RFID tags. IEEE Transactions on Wireless Communication, 9(6), 1882–1889.
Kang, L., Zhang, J., Wu, K., Zhang, D., & Ni, L. M. (2012). RCSMA: Receiver-based carrier sense multiple access in UHF RFID systems. IEEE Transactions on Parallel and Distributed Systems, 23, 735–743.
Jia, X., Feng, Q., & Yu, L. (2012). Stability analysis of an efficient anti-collision protocol for RFID tag identification. IEEE Transactions on Communications, 60, 2285–2294.
Chen, W. T. (2009). An accurate tag estimate method for improving the performance of an RFID anti-collision algorithm based on dynamic frame length ALOHA. IEEE Transactions on Automation Science and Engineering, 6(1), 9–15.
Su, W., Alchazidis, N. V., & Ha, T. T. (2010). Multiple RFID tags access algorithm. IEEE Transactions on Mobile Computing, 9(2), 174–187.
Liu, H., Ning, H., Zhang, Y., He, D., Xiong, Q., & Yang, L. T. (2013). Grouping-proofs based authentication protocol for distributed RFID systems. IEEE Transactions on Parallel and Distributed Systems, 24, 1321–1330.
Zuo, Y. (2010). Survivable RFID systems: Issues, challenges, and techniques. IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews, 40, 406–418.
Ren, K., Yu, S., Lou, W., & Zhang, Y. (2010). PEACE: A novel privacy-enhanced yet accountable security method for metropolitan wireless mesh networks. IEEE Transactions on Parallel and Distributed Systems, 21(2), 203–215.
Zhu, H., Li, M., Zhu, Y., & Ni, L. M. (2009). HERO: Online real-time vehicle tracking. IEEE Transactions on Parallel and Distributed Systems, 20, 740–752.
Bu, K., Liu, X., Luo, J., Xiao, B., & Wei, G. (2013). Unreconciled collisions uncover cloning attacks in anonymous RFID systems. IEEE Transactions on Information Forensics and Security, 8, 429–439.
Kalansuriya, P., Bhattacharyya, R., & Sarma, S. (2013). RFID tag antenna-based sensing for pervasive surface crack detection. IEEE Sensors Journal, 13, 1564–1570.
Wu, H., Zeng, Y., Feng, J., & Gu, Y. (2013). Binary tree slotted ALOHA for passive RFID tag anticollision. IEEE Transactions on Parallel and Distributed Systems, 24, 19–31.
Boaventura, A. J. S., & Carvalho, N. B. (2013). Extending reading range of commercial RFID readers. IEEE Transactions on Microwave Theory and Techniques, 61, 633–640.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Pandian, M.T., Sukumar, R. Performance Enhancement with Improved Security an Approach for Formulating RFID as an Itinerary in Promulgating Succour for Object Detection. Wireless Pers Commun 109, 797–811 (2019). https://doi.org/10.1007/s11277-019-06591-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-019-06591-9