Skip to main content
Log in

Performance Enhancement with Improved Security an Approach for Formulating RFID as an Itinerary in Promulgating Succour for Object Detection

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In real time process, tracking of objects allows an agency to record, track, and examine an object and these features enhance the public service through better on-time performance and quicker response time for emergency. Radio-frequency identification (RFID) method is proposed to address the problem of security for automatically identifying and tracking tags attached to objects and to transfer data it is a wireless non-contact radio-frequency electromagnetic fields. Moreover, along with Performance Enhancement with Improved Security approach the new RFID method is established for enhancing the performance as well as guaranteeing security features and the components of a typical RFID method comprises RFID reader, RFID tag, backend system, and the cluster head. The tag is entrenched in the tracked object and it does not need to be within line of sight of the reader like a barcode. Moreover, SECF method is to apply secure RFID method and increase the efficiency in tracking of objects with improved security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Algorithm 1
Fig. 2
Algorithm 2
Algorithm 3
Fig. 3
Fig. 4
Algorithm 4
Algorithm 5
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Wang, B., & Ma, M. (2012). A server independent authentication scheme for RFID systems. IEEE Transactions on Industrial Informatics, 8, 689–696.

    Article  Google Scholar 

  2. Garfinkel, S. L., Juels, A., & Pappu, R. (2005). RFID privacy: An overview of problems and proposed solutions. IEEE Security Privacy, 3, 34–43.

    Article  Google Scholar 

  3. Tan, C. C., Sheng, B., & Li, Q. (2008). Secure and serverless RFID authentication and search protocols. IEEE Transactions on Wireless Communications, 7, 1400–1407.

    Article  Google Scholar 

  4. Qian, C., Liu, Y., Ngan, H., & Ni, L. M. (2008). ASAP: Scalable collision arbitration for large RFID systems. IEEE Transactions on Parallel and Distributed Systems, 24, 1277–1288.

    Article  Google Scholar 

  5. Bonuccelli, M. A., Lonetti, F., & Martelli, F. (2007). Tree slotted ALOHA: A new protocol for tag identification in RFID networks. Elsevier Ad Hoc Networks.

  6. Konstantinou, N. (2012). Expowave: An RFID anti-collision algorithm for dense and lively environments. IEEE Transactions on Communications, 60, 352–356.

    Article  Google Scholar 

  7. Thiesse, F., Fleisch, E., & Dierkes, M. (2006). Lot track: RFID-based process control in the semiconductor industry. IEEE Pervasive Computing, 5(1), 47–53.

    Article  Google Scholar 

  8. Bu, K., Xiao, B., Xiao, Q., & Chen, S. (2012). Efficient misplaced-tag pinpointing in large RFID systems. IEEE Transactions on Parallel and Distributed Systems, 23, 2094–2106.

    Article  Google Scholar 

  9. Tan, C., Sheng, B., & Li, Q. (2010). Efficient techniques for monitoring missing RFID tags. IEEE Transactions on Wireless Communication, 9(6), 1882–1889.

    Article  Google Scholar 

  10. Kang, L., Zhang, J., Wu, K., Zhang, D., & Ni, L. M. (2012). RCSMA: Receiver-based carrier sense multiple access in UHF RFID systems. IEEE Transactions on Parallel and Distributed Systems, 23, 735–743.

    Article  Google Scholar 

  11. Jia, X., Feng, Q., & Yu, L. (2012). Stability analysis of an efficient anti-collision protocol for RFID tag identification. IEEE Transactions on Communications, 60, 2285–2294.

    Article  Google Scholar 

  12. Chen, W. T. (2009). An accurate tag estimate method for improving the performance of an RFID anti-collision algorithm based on dynamic frame length ALOHA. IEEE Transactions on Automation Science and Engineering, 6(1), 9–15.

    Article  Google Scholar 

  13. Su, W., Alchazidis, N. V., & Ha, T. T. (2010). Multiple RFID tags access algorithm. IEEE Transactions on Mobile Computing, 9(2), 174–187.

    Article  Google Scholar 

  14. Liu, H., Ning, H., Zhang, Y., He, D., Xiong, Q., & Yang, L. T. (2013). Grouping-proofs based authentication protocol for distributed RFID systems. IEEE Transactions on Parallel and Distributed Systems, 24, 1321–1330.

    Article  Google Scholar 

  15. Zuo, Y. (2010). Survivable RFID systems: Issues, challenges, and techniques. IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews, 40, 406–418.

    Google Scholar 

  16. Ren, K., Yu, S., Lou, W., & Zhang, Y. (2010). PEACE: A novel privacy-enhanced yet accountable security method for metropolitan wireless mesh networks. IEEE Transactions on Parallel and Distributed Systems, 21(2), 203–215.

    Article  Google Scholar 

  17. Zhu, H., Li, M., Zhu, Y., & Ni, L. M. (2009). HERO: Online real-time vehicle tracking. IEEE Transactions on Parallel and Distributed Systems, 20, 740–752.

    Article  Google Scholar 

  18. Bu, K., Liu, X., Luo, J., Xiao, B., & Wei, G. (2013). Unreconciled collisions uncover cloning attacks in anonymous RFID systems. IEEE Transactions on Information Forensics and Security, 8, 429–439.

    Article  Google Scholar 

  19. Kalansuriya, P., Bhattacharyya, R., & Sarma, S. (2013). RFID tag antenna-based sensing for pervasive surface crack detection. IEEE Sensors Journal, 13, 1564–1570.

    Article  Google Scholar 

  20. Wu, H., Zeng, Y., Feng, J., & Gu, Y. (2013). Binary tree slotted ALOHA for passive RFID tag anticollision. IEEE Transactions on Parallel and Distributed Systems, 24, 19–31.

    Article  Google Scholar 

  21. Boaventura, A. J. S., & Carvalho, N. B. (2013). Extending reading range of commercial RFID readers. IEEE Transactions on Microwave Theory and Techniques, 61, 633–640.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Thurai Pandian.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pandian, M.T., Sukumar, R. Performance Enhancement with Improved Security an Approach for Formulating RFID as an Itinerary in Promulgating Succour for Object Detection. Wireless Pers Commun 109, 797–811 (2019). https://doi.org/10.1007/s11277-019-06591-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06591-9

Keywords

Navigation