228 research outputs found
Missing tags detection algorithm for radio frequency identification (RFID) data stream
RFID technology is a radio frequency identification services that provide a reader reading the information of items from the tags. Nowadays, RFID system is rapidly become more common in our live because it cheaper and smaller to be track, trace and identify the items. However, missing tag detection in RFID can occur due to RFID operating environment such as signal collisions and interferences. Missing tags also called as false negative reads is a tag that is present but it cannot be read by the nearby reader. The consequences of this problem can be enormous to business, as it will cause the system to report incorrect data due to an incorrect number of tags being detected. In fact, the performance of RFID missing tag detection is largely affected by uncertainty, which should be considered in the detecting process phase to minimize its negative impact. Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). AC complement algorithm was used to compare the different in each set of data. Meanwhile, DFR algorithm was used to identify the false negative read that present in the set of data. There are many approaches has been proposed to include Window Sub-range Transition Detection (WSTD), Efficient Missing-Tag Detection Protocol (EMD) and Multi-hashing based Missing Tag Identification (MMTI) protocol. This algorithm development has been guided by methodology in four stages. There stages including data preparation, simulation design, detecting false negative read strategy and performance measurement. MTDA can perform well in detecting false negative read with 100% detected in 3.25 second. This performance shows that the algorithm performs well in execution time in detecting false negative reads. In conclusion, it will give insight on the current challenges and open up to new solution to solve the problem of missing tag detection
Ensuring Application Specific Security, Privacy and Performance Goals in RFID Systems
Radio Frequency IDentification (RFID) is an automatic identification technology that uses radio frequency to identify objects. Securing RFID systems and providing privacy in RFID applications has been the focus of much academic work lately. To ensure universal acceptance of RFID technology, security and privacy issued must be addressed into the design of any RFID application. Due to the constraints on memory, power, storage capacity, and amount of logic on RFID devices, traditional public key based strong security mechanisms are unsuitable for them. Usually, low cost general authentication protocols are used to secure RFID systems. However, the generic authentication protocols provide relatively low performance for different types of RFID applications. We identified that each RFID application has unique research challenges and different performance bottlenecks based on the characteristics of the system. One strategy is to devise security protocols such that application specific goals are met and system specific performance requirements are maximized.
This dissertation aims to address the problem of devising application specific security protocols for current and next generation RFID systems so that in each application area maximum performance can be achieved and system specific goals are met. In this dissertation, we propose four different authentication techniques for RFID technologies, providing solutions to the following research issues: 1) detecting counterfeit as well as ensuring low response time in large scale RFID systems, 2) preserving privacy and maintaining scalability in RFID based healthcare systems, 3) ensuring security and survivability of Computational RFID (CRFID) networks, and 4) detecting missing WISP tags efficiently to ensure reliability of CRFID based system\u27s decision. The techniques presented in this dissertation achieve good levels of privacy, provide security, scale to large systems, and can be implemented on resource-constrained RFID devices
Recommended from our members
An efficient missing tag identification approach in RFID collisions
Radio frequency identification technology has been widely used to verify the presence of items in many applications such as warehouse management and supply chain logistics. In these applications, the challenge of how to timely identify the missing tags (namely tag searching or missing tag identification) is a key focus. Existing missing tag identification solutions have not achieved their full potentials because collision slots have not been well explored. In this paper, we propose an approach named collision resolving based missing tag identification (CR-MTI) to break through the performance bottleneck of existing missing tag identification protocols. In CR-MTI, multiple tags are allowed to respond with different binary strings in a collision slot. Then, the reader can verify them together by using the bit tracking technology and particularly designed string, thereby significantly improve the time efficiency. CR-MTI also reduces the number of messages transmitted by the reader using customized coding. We further explore the optimal parameter settings to maximize the performance of our proposed CR-MTI. Extensive simulation results show that our proposed CR-MTI outperforms prior art in terms of time efficiency, total executive time and communication complexity
Security and Privacy in Mobile Computing: Challenges and Solutions
abstract: Mobile devices are penetrating everyday life. According to a recent Cisco report [10], the number of mobile connected devices such as smartphones, tablets, laptops, eReaders, and Machine-to-Machine (M2M) modules will hit 11.6 billion by 2021, exceeding the world's projected population at that time (7.8 billion). The rapid development of mobile devices has brought a number of emerging security and privacy issues in mobile computing. This dissertation aims to address a number of challenging security and privacy issues in mobile computing.
This dissertation makes fivefold contributions. The first and second parts study the security and privacy issues in Device-to-Device communications. Specifically, the first part develops a novel scheme to enable a new way of trust relationship called spatiotemporal matching in a privacy-preserving and efficient fashion. To enhance the secure communication among mobile users, the second part proposes a game-theoretical framework to stimulate the cooperative shared secret key generation among mobile users. The third and fourth parts investigate the security and privacy issues in mobile crowdsourcing. In particular, the third part presents a secure and privacy-preserving mobile crowdsourcing system which strikes a good balance among object security, user privacy, and system efficiency. The fourth part demonstrates a differentially private distributed stream monitoring system via mobile crowdsourcing. Finally, the fifth part proposes VISIBLE, a novel video-assisted keystroke inference framework that allows an attacker to infer a tablet user's typed inputs on the touchscreen by recording and analyzing the video of the tablet backside during the user's input process. Besides, some potential countermeasures to this attack are also discussed. This dissertation sheds the light on the state-of-the-art security and privacy issues in mobile computing.Dissertation/ThesisDoctoral Dissertation Electrical Engineering 201
Robotic Wireless Sensor Networks
In this chapter, we present a literature survey of an emerging, cutting-edge,
and multi-disciplinary field of research at the intersection of Robotics and
Wireless Sensor Networks (WSN) which we refer to as Robotic Wireless Sensor
Networks (RWSN). We define a RWSN as an autonomous networked multi-robot system
that aims to achieve certain sensing goals while meeting and maintaining
certain communication performance requirements, through cooperative control,
learning and adaptation. While both of the component areas, i.e., Robotics and
WSN, are very well-known and well-explored, there exist a whole set of new
opportunities and research directions at the intersection of these two fields
which are relatively or even completely unexplored. One such example would be
the use of a set of robotic routers to set up a temporary communication path
between a sender and a receiver that uses the controlled mobility to the
advantage of packet routing. We find that there exist only a limited number of
articles to be directly categorized as RWSN related works whereas there exist a
range of articles in the robotics and the WSN literature that are also relevant
to this new field of research. To connect the dots, we first identify the core
problems and research trends related to RWSN such as connectivity,
localization, routing, and robust flow of information. Next, we classify the
existing research on RWSN as well as the relevant state-of-the-arts from
robotics and WSN community according to the problems and trends identified in
the first step. Lastly, we analyze what is missing in the existing literature,
and identify topics that require more research attention in the future
Train Localisation using Wireless Sensor Networks
Safety and reliability have always been concerns for railway transportation.
Knowing the exact location of a train enables the railway system to react to
an unusual situation for the safety of human lives and properties. Generally,
the accuracy of localisation systems is related with their deployment and
maintenance costs, which can be on the order of millions of dollars a year.
Despite a lot of research efforts, existing localisation systems based on different
technologies are still limited because most of them either require
expensive infrastructure (ultrasound and laser), have high database maintenance,
computational costs or accumulate errors (vision), offer limited
coverage (GPS-dark regions, Wi-Fi, RFID) or provide low accuracy (audible
sound). On the other hand, wireless sensor networks (WSNs) offer the
potential for a cheap, reliable and accurate solutions for the train localisation
system. This thesis proposes a WSN-based train localisation system,
in which train location is estimated based on the information gathered
through the communication between the anchor sensors deployed along the
track and the gateway sensor installed on the train, such as anchor sensors'
geographic coordinates and the Received Signal Strength Indicator (RSSI).
In the proposed system, timely anchor-gateway communication implies accurate
localisation. How to guarantee effective communication between anchor sensors along the track and the gateway sensor on the train is a challenging problem for WSN-based train localisation. I propose a beacon driven sensors wake-up scheme (BWS) to address this problem. BWS allows each anchor sensor to run an asynchronous duty-cycling protocol to conserve energy and establishes an upper bound on the sleep time in one duty
cycle to guarantee their timely wake-up once a train approaches. Simulation
results show that the BWS scheme can timely wake up the anchor
sensors at a very low energy consumption cost.
To design an accurate scheme for train localisation, I conducted on-site
experiments in an open field, a railway station and a tunnel, and the results show that RSSI can be used as an estimator for train localisation and
its applicability increases with the incorporation of another type of data
such as location information of anchor sensors. By combining the advantages
of RSSI-based distance estimation and Particle Filtering techniques,
I designed a Particle-Filter-based train localisation scheme and propose
a novel Weighted RSSI Likelihood Function (WRLF) for particle update.
The proposed localisation scheme is evaluated through extensive simulations
using the data obtained from the on-site measurements. Simulation
results demonstrate that the proposed scheme can achieve significant accuracy,
where average localisation error stays under 30 cm at the train speed
of 40 m=s, 40% anchor sensors failure rate and sparse deployment. In addition,
the proposed train localisation scheme is robust to changes in train
speed, the deployment density and reliability of anchor sensors.
Anchor sensors are prone to hardware and software deterioration such as
battery outage and dislocation. Therefore, in order to reduce the negative
impacts of these problems, I designed a novel Consensus-based Anchor sensor
Management Scheme (CAMS), in which each anchor sensor performs
a self-diagnostics and reports the detected faults in the neighbourhood.
CAMS can assist the gateway sensor to exclude the input from the faulty
anchor sensors. In CAMS, anchor sensors update each other about their
opinions on other neighbours and develops consensus to mark faulty sensors.
In addition, CAMS also reports the system information such as signal
path loss ratio and allows anchor sensors to re-calibrate and verify their
geographic coordinates. CAMS is evaluated through extensive simulations
based on real data collected from field experiments. This evaluation also
incorporated the simulated node failure model in simulations.
Though there are no existing WSN-based train localisation systems available
to directly compare our results with, the proposed schemes are evaluated
with real datasets, theoretical models and existing work wherever it
was possible. Overall, the WSN-based train localisation system enables the
use of RSSI, with combination of location coordinates of anchor sensors, as
location estimator. Due to low cost of sensor devices, the cost of overall
system remains low. Further, with duty-cycling operation, energy of the
sensor nodes and system is conserved
Reliable Communication in Wireless Networks
Wireless communication systems are increasingly being used in industries and infrastructures since they offer significant advantages such as cost effectiveness and scalability with respect to wired communication system. However, the broadcast feature and the unreliable links in the wireless communication system may cause more communication collisions and redundant transmissions. Consequently, guaranteeing reliable and efficient transmission in wireless communication systems has become a big challenging issue. In particular, analysis and evaluation of reliable transmission protocols in wireless sensor networks (WSNs) and radio frequency identification system (RFID) are strongly required.
This thesis proposes to model, analyze and evaluate self-configuration algorithms in wireless communication systems. The objective is to propose innovative solutions for communication protocols in WSNs and RFID systems, aiming at optimizing the performance of the algorithms in terms of throughput, reliability and power consumption. The first activity focuses on communication protocols in WSNs, which have been investigated, evaluated and optimized, in order to ensure fast and reliable data transmission between sensor nodes. The second research topic addresses the interference problem in RFID systems. The target is to evaluate and develop precise models for accurately describing the interference among readers. Based on these models, new solutions for reducing collision in RFID systems have been investigated
- …