228 research outputs found

    Missing tags detection algorithm for radio frequency identification (RFID) data stream

    Get PDF
    RFID technology is a radio frequency identification services that provide a reader reading the information of items from the tags. Nowadays, RFID system is rapidly become more common in our live because it cheaper and smaller to be track, trace and identify the items. However, missing tag detection in RFID can occur due to RFID operating environment such as signal collisions and interferences. Missing tags also called as false negative reads is a tag that is present but it cannot be read by the nearby reader. The consequences of this problem can be enormous to business, as it will cause the system to report incorrect data due to an incorrect number of tags being detected. In fact, the performance of RFID missing tag detection is largely affected by uncertainty, which should be considered in the detecting process phase to minimize its negative impact. Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). AC complement algorithm was used to compare the different in each set of data. Meanwhile, DFR algorithm was used to identify the false negative read that present in the set of data. There are many approaches has been proposed to include Window Sub-range Transition Detection (WSTD), Efficient Missing-Tag Detection Protocol (EMD) and Multi-hashing based Missing Tag Identification (MMTI) protocol. This algorithm development has been guided by methodology in four stages. There stages including data preparation, simulation design, detecting false negative read strategy and performance measurement. MTDA can perform well in detecting false negative read with 100% detected in 3.25 second. This performance shows that the algorithm performs well in execution time in detecting false negative reads. In conclusion, it will give insight on the current challenges and open up to new solution to solve the problem of missing tag detection

    Ensuring Application Specific Security, Privacy and Performance Goals in RFID Systems

    Get PDF
    Radio Frequency IDentification (RFID) is an automatic identification technology that uses radio frequency to identify objects. Securing RFID systems and providing privacy in RFID applications has been the focus of much academic work lately. To ensure universal acceptance of RFID technology, security and privacy issued must be addressed into the design of any RFID application. Due to the constraints on memory, power, storage capacity, and amount of logic on RFID devices, traditional public key based strong security mechanisms are unsuitable for them. Usually, low cost general authentication protocols are used to secure RFID systems. However, the generic authentication protocols provide relatively low performance for different types of RFID applications. We identified that each RFID application has unique research challenges and different performance bottlenecks based on the characteristics of the system. One strategy is to devise security protocols such that application specific goals are met and system specific performance requirements are maximized. This dissertation aims to address the problem of devising application specific security protocols for current and next generation RFID systems so that in each application area maximum performance can be achieved and system specific goals are met. In this dissertation, we propose four different authentication techniques for RFID technologies, providing solutions to the following research issues: 1) detecting counterfeit as well as ensuring low response time in large scale RFID systems, 2) preserving privacy and maintaining scalability in RFID based healthcare systems, 3) ensuring security and survivability of Computational RFID (CRFID) networks, and 4) detecting missing WISP tags efficiently to ensure reliability of CRFID based system\u27s decision. The techniques presented in this dissertation achieve good levels of privacy, provide security, scale to large systems, and can be implemented on resource-constrained RFID devices

    Security and Privacy in Mobile Computing: Challenges and Solutions

    Get PDF
    abstract: Mobile devices are penetrating everyday life. According to a recent Cisco report [10], the number of mobile connected devices such as smartphones, tablets, laptops, eReaders, and Machine-to-Machine (M2M) modules will hit 11.6 billion by 2021, exceeding the world's projected population at that time (7.8 billion). The rapid development of mobile devices has brought a number of emerging security and privacy issues in mobile computing. This dissertation aims to address a number of challenging security and privacy issues in mobile computing. This dissertation makes fivefold contributions. The first and second parts study the security and privacy issues in Device-to-Device communications. Specifically, the first part develops a novel scheme to enable a new way of trust relationship called spatiotemporal matching in a privacy-preserving and efficient fashion. To enhance the secure communication among mobile users, the second part proposes a game-theoretical framework to stimulate the cooperative shared secret key generation among mobile users. The third and fourth parts investigate the security and privacy issues in mobile crowdsourcing. In particular, the third part presents a secure and privacy-preserving mobile crowdsourcing system which strikes a good balance among object security, user privacy, and system efficiency. The fourth part demonstrates a differentially private distributed stream monitoring system via mobile crowdsourcing. Finally, the fifth part proposes VISIBLE, a novel video-assisted keystroke inference framework that allows an attacker to infer a tablet user's typed inputs on the touchscreen by recording and analyzing the video of the tablet backside during the user's input process. Besides, some potential countermeasures to this attack are also discussed. This dissertation sheds the light on the state-of-the-art security and privacy issues in mobile computing.Dissertation/ThesisDoctoral Dissertation Electrical Engineering 201

    Robotic Wireless Sensor Networks

    Full text link
    In this chapter, we present a literature survey of an emerging, cutting-edge, and multi-disciplinary field of research at the intersection of Robotics and Wireless Sensor Networks (WSN) which we refer to as Robotic Wireless Sensor Networks (RWSN). We define a RWSN as an autonomous networked multi-robot system that aims to achieve certain sensing goals while meeting and maintaining certain communication performance requirements, through cooperative control, learning and adaptation. While both of the component areas, i.e., Robotics and WSN, are very well-known and well-explored, there exist a whole set of new opportunities and research directions at the intersection of these two fields which are relatively or even completely unexplored. One such example would be the use of a set of robotic routers to set up a temporary communication path between a sender and a receiver that uses the controlled mobility to the advantage of packet routing. We find that there exist only a limited number of articles to be directly categorized as RWSN related works whereas there exist a range of articles in the robotics and the WSN literature that are also relevant to this new field of research. To connect the dots, we first identify the core problems and research trends related to RWSN such as connectivity, localization, routing, and robust flow of information. Next, we classify the existing research on RWSN as well as the relevant state-of-the-arts from robotics and WSN community according to the problems and trends identified in the first step. Lastly, we analyze what is missing in the existing literature, and identify topics that require more research attention in the future

    Train Localisation using Wireless Sensor Networks

    Get PDF
    Safety and reliability have always been concerns for railway transportation. Knowing the exact location of a train enables the railway system to react to an unusual situation for the safety of human lives and properties. Generally, the accuracy of localisation systems is related with their deployment and maintenance costs, which can be on the order of millions of dollars a year. Despite a lot of research efforts, existing localisation systems based on different technologies are still limited because most of them either require expensive infrastructure (ultrasound and laser), have high database maintenance, computational costs or accumulate errors (vision), offer limited coverage (GPS-dark regions, Wi-Fi, RFID) or provide low accuracy (audible sound). On the other hand, wireless sensor networks (WSNs) offer the potential for a cheap, reliable and accurate solutions for the train localisation system. This thesis proposes a WSN-based train localisation system, in which train location is estimated based on the information gathered through the communication between the anchor sensors deployed along the track and the gateway sensor installed on the train, such as anchor sensors' geographic coordinates and the Received Signal Strength Indicator (RSSI). In the proposed system, timely anchor-gateway communication implies accurate localisation. How to guarantee effective communication between anchor sensors along the track and the gateway sensor on the train is a challenging problem for WSN-based train localisation. I propose a beacon driven sensors wake-up scheme (BWS) to address this problem. BWS allows each anchor sensor to run an asynchronous duty-cycling protocol to conserve energy and establishes an upper bound on the sleep time in one duty cycle to guarantee their timely wake-up once a train approaches. Simulation results show that the BWS scheme can timely wake up the anchor sensors at a very low energy consumption cost. To design an accurate scheme for train localisation, I conducted on-site experiments in an open field, a railway station and a tunnel, and the results show that RSSI can be used as an estimator for train localisation and its applicability increases with the incorporation of another type of data such as location information of anchor sensors. By combining the advantages of RSSI-based distance estimation and Particle Filtering techniques, I designed a Particle-Filter-based train localisation scheme and propose a novel Weighted RSSI Likelihood Function (WRLF) for particle update. The proposed localisation scheme is evaluated through extensive simulations using the data obtained from the on-site measurements. Simulation results demonstrate that the proposed scheme can achieve significant accuracy, where average localisation error stays under 30 cm at the train speed of 40 m=s, 40% anchor sensors failure rate and sparse deployment. In addition, the proposed train localisation scheme is robust to changes in train speed, the deployment density and reliability of anchor sensors. Anchor sensors are prone to hardware and software deterioration such as battery outage and dislocation. Therefore, in order to reduce the negative impacts of these problems, I designed a novel Consensus-based Anchor sensor Management Scheme (CAMS), in which each anchor sensor performs a self-diagnostics and reports the detected faults in the neighbourhood. CAMS can assist the gateway sensor to exclude the input from the faulty anchor sensors. In CAMS, anchor sensors update each other about their opinions on other neighbours and develops consensus to mark faulty sensors. In addition, CAMS also reports the system information such as signal path loss ratio and allows anchor sensors to re-calibrate and verify their geographic coordinates. CAMS is evaluated through extensive simulations based on real data collected from field experiments. This evaluation also incorporated the simulated node failure model in simulations. Though there are no existing WSN-based train localisation systems available to directly compare our results with, the proposed schemes are evaluated with real datasets, theoretical models and existing work wherever it was possible. Overall, the WSN-based train localisation system enables the use of RSSI, with combination of location coordinates of anchor sensors, as location estimator. Due to low cost of sensor devices, the cost of overall system remains low. Further, with duty-cycling operation, energy of the sensor nodes and system is conserved

    Reliable Communication in Wireless Networks

    Get PDF
    Wireless communication systems are increasingly being used in industries and infrastructures since they offer significant advantages such as cost effectiveness and scalability with respect to wired communication system. However, the broadcast feature and the unreliable links in the wireless communication system may cause more communication collisions and redundant transmissions. Consequently, guaranteeing reliable and efficient transmission in wireless communication systems has become a big challenging issue. In particular, analysis and evaluation of reliable transmission protocols in wireless sensor networks (WSNs) and radio frequency identification system (RFID) are strongly required. This thesis proposes to model, analyze and evaluate self-configuration algorithms in wireless communication systems. The objective is to propose innovative solutions for communication protocols in WSNs and RFID systems, aiming at optimizing the performance of the algorithms in terms of throughput, reliability and power consumption. The first activity focuses on communication protocols in WSNs, which have been investigated, evaluated and optimized, in order to ensure fast and reliable data transmission between sensor nodes. The second research topic addresses the interference problem in RFID systems. The target is to evaluate and develop precise models for accurately describing the interference among readers. Based on these models, new solutions for reducing collision in RFID systems have been investigated
    • …
    corecore