Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3117811.3117835acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Analog On-Tag Hashing: Towards Selective Reading as Hash Primitives in Gen2 RFID Systems

Published: 04 October 2017 Publication History

Abstract

Deployment of billions of Commercial Off-The-Shelf (COTS) RFID tags has drawn much of the attention of the research community because of the performance gaps of current systems. In particular, hash-enabled protocol (HEP) is one of the most thoroughly studied topics in the past decade. HEPs are designed for a wide spectrum of notable applications (e.g., missing detection) without need to collect all tags. HEPs assume that each tag contains a hash function, such that a tag can select a random but predicable time slot to reply with a one-bit presence signal that shows its existence. However, the hash function has never been implemented in COTS tags in reality, which makes HEPs a 10-year untouchable mirage. This work designs and implements a group of analog on-tag hash primitives (called Tash) for COTS Gen2-compatible RFID systems, which moves prior HEPs forward from theory to practice. In particular, we design three types of hash primitives, namely, tash function, tash table function and tash operator. All of these hash primitives are implemented through selective reading, which is a fundamental and mandatory functionality specified in Gen2 protocol, without any hardware modification and fabrication. We further apply our hash primitives in two typical HEP applications (i.e., cardinality estimation and missing detection) to show the feasibility and effectiveness of Tash. Results from our prototype, which is composed of one ImpinJ reader and 3,000 Alien tags, demonstrate that the new design lowers 60% of the communication overhead in the air. The tash operator can additionally introduce an overhead drop of 29.7%.

References

[1]
Andrey Bogdanov, Lars R Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew JB Robshaw, Yannick Seurin, and Charlotte Vikkelsoe 2007. PRESENT: An ultra-lightweight block cipher. In CHES, Vol. Vol. 4727. Springer, 450--466.
[2]
Andrey Bogdanov, Gregor Leander, Christof Paar, Axel Poschmann, Matt JB Robshaw, and Yannick Seurin. 2008. Hash functions and RFID tags: Mind the gap. In Proc. of IACR CHES.
[3]
Andrei Broder and Michael Mitzenmacher 2004. Network applications of bloom filters: A survey. Internet Mathematics, Vol. 1, 4 (2004), 485--509.
[4]
Binbin Chen, Ziling Zhou, and Haifeng Yu 2013. Understanding RFID counting protocols. In Proc. of ACM MobiCom.
[5]
Daniel M Dobkin. 2012. The RF in RFID: UHF RFID in Practice. Newnes.
[6]
Martin Feldhofer, Sandra Dominikus, and Johannes Wolkerstorfer. 2004. Strong authentication for RFID systems using the AES algorithm CHES, Vol. Vol. 4. Springer, 357--370.
[7]
Martin Feldhofer and Christian Rechberger 2006. A case against currently used hash functions in RFID protocols On the move to meaningful internet systems 2006: OTM 2006 workshops. Springer, 372--381.
[8]
Frost and Sullivan. 2011. Global RFID healthcare and pharmaceutical marke. Industry Report (2011).
[9]
Wei Gong, Kebin Liu, Xin Miao, and Haoxiang Liu. 2014. Arbitrarily accurate approximation scheme for large-scale rfid cardinality estimation Proc. of IEEE INFOCOM.
[10]
Tim Good and Mohammed Benaissa 2007. Hardware results for selected stream cipher candidates. State of the Art of Stream Ciphers Vol. 7 (2007), 191--204.
[11]
Hao Han, Bo Sheng, Chiu C Tan, Qun Li, Weizhen Mao, and Sanglu Lu. 2010. Counting RFID tags efficiently and anonymously. In Proc. of IEEE INFOCOM.
[12]
Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, et almbox. 2006. HIGHT: A new block cipher suitable for low-resource device CHES, Vol. Vol. 4249. Springer, 46--59.
[13]
Yuxiao Hou, Jiajue Ou, Yuanqing Zheng, and Mo Li. 2015. PLACE: Physical layer cardinality estimation for large-scale RFID systems Proc. of IEEE INFOCOM.
[14]
Murali Kodialam and Thyaga Nandagopal 2006. Fast and reliable estimation schemes in RFID systems Proc. of ACM MobiCom.
[15]
Murali Kodialam, Thyaga Nandagopal, and Wing Cheong Lau. 2007. Anonymous tracking using RFID tags. In Proc. of IEEE INFOCOM.
[16]
Binbin Li, Yuan He, Wenyuan Liu, Lin Wang, and Hongyan Wang 2016. LocP: An efficient Localized Polling Protocol for large-scale RFID systems Proc. of IEEE ICNP.
[17]
Tao Li, Shigang Chen, and Yibei Ling 2010. Identifying the missing tags in a large RFID system Proc. of ACM MobiHoc.
[18]
Tao Li, Shigang Chen, and Yibei Ling 2013. Efficient protocols for identifying the missing tags in a large RFID system. IEEE/ACM Transactions on Networking Vol. 21, 6 (2013), 1974--1987.
[19]
Tao Li, Samuel Wu, Shigang Chen, and Mark Yang. 2010. Energy efficient algorithms for the RFID estimation problem Proc. of IEEE INFOCOM.
[20]
Chae Hoon Lim and Tymur Korkishko 2005. mCrypton-a lightweight block cipher for security of low-cost RFID tags and sensors WISA, Vol. Vol. 3786. Springer, 243--258.
[21]
Haoxiang Liu, Wei Gong, Xin Miao, Kebin Liu, and Wenbo He 2014. Towards adaptive continuous scanning in large-scale rfid systems Proc. of IEEE INFOCOM.
[22]
Jia Liu, Bin Xiao, Shigang Chen, Feng Zhu, and Lijun Chen 2015. Fast RFID grouping protocols. In Proc. of IEEE INFOCOM. 1948--1956.
[23]
Xiulong Liu, Keqiu Li, Geyong Min, Yanming Shen, Alex X Liu, and Wenyu Qu. 2014. A multiple hashing approach to complete identification of missing RFID tags. IEEE Transactions on Communications Vol. 62, 3 (2014), 1046--1057.
[24]
Xiulong Liu, Keqiu Li, Heng Qi, Bin Xiao, and Xin Xie 2014. Fast counting the key tags in anonymous RFID systems Proc.of IEEE ICNP.
[25]
Xiulong Liu, Bin Xiao, Keqiu Li, Jie Wu, Alex X Liu, Heng Qi, and Xin Xie. 2015. RFID cardinality estimation with blocker tags. In Proc. of IEEE INFOCOM.
[26]
Xuan Liu, Bin Xiao, Shigeng Zhang, Kai Bu, and Alvin Chan 2015. STEP: A time-efficient tag searching protocol in large RFID systems. IEEE Trans. Comput. Vol. 64, 11 (2015), 3265--3277.
[27]
Wen Luo, Shigang Chen, Tao Li, and Shiping Chen. 2011. Efficient missing tag detection in RFID systems. Proc. of IEEE INFOCOM.
[28]
Wen Luo, Shigang Chen, Tao Li, and Yan Qiao. 2012. Probabilistic missing-tag detection and energy-time tradeoff in large-scale RFID systems Proc. of ACM MobiHoc.
[29]
Wen Luo, Shigang Chen, Yan Qiao, and Tao Li. 2014. Missing-tag detection and energy--time tradeoff in large-scale RFID systems with unreliable channels. IEEE/ACM Transactions on Networking Vol. 22, 4 (2014), 1079--1091.
[30]
Wen Luo, Yan Qiao, and Shigang Chen 2013. An efficient protocol for RFID multigroup threshold-based classification Proc. of IEEE INFOCOM. 890--898.
[31]
Wen Luo, Yan Qiao, Shigang Chen, and Min Chen. 2016. An efficient protocol for RFID multigroup threshold-based classification based on sampling and logical bitmap. IEEE/ACM Transactions on Networking Vol. 24, 1 (2016), 397--407.
[32]
Cunqing Ma, Jingqiang Lin, and Yuewu Wang 2012. Efficient missing tag detection in a large RFID system Proc. of IEEE TrustCom.
[33]
Christian Pendl, Markus Pelnar, and Michael Hutter. 2012. Elliptic curve cryptography on the WISP UHF RFID tag. RFID. Security and Privacy (2012), 32--47.
[34]
Matthai Philipose, Joshua R Smith, Bing Jiang, Alexander Mamishev, Sumit Roy, and Kishore Sundara-Rajan 2005. Battery-free wireless identification and sensing. IEEE Pervasive computing Vol. 4, 1 (2005), 37--45.
[35]
Axel Poschmann, Gregor Leander, Kai Schramm, and Christof Paar 2007. New Light-Weight DES Variants Suited for RFID Applications, proceedings of Fast Software Encryption 14. Lecture Notes in Computer Science, Springer (to appear) (2007).
[36]
Chen Qian, Yunhuai Liu, Hoilun Ngan, and Lionel M Ni. 2010. Asap: Scalable identification and counting for contactless rfid systems Proc. of IEEE ICDCS.
[37]
Chen Qian, Hoilun Ngan, Yunhao Liu, and Lionel M Ni. 2011. Cardinality estimation for large-scale RFID systems. IEEE Transactions on Parallel and Distributed Systems, Vol. 22, 9 (2011), 1441--1454.
[38]
Yan Qiao, Shigang Chen, and Tao Li 2013. Tag-ordering polling protocols in RFID systems. RFID as an Infrastructure. Springer, 59--82.
[39]
Yan Qiao, Shigang Chen, Tao Li, and Shiping Chen. 2011. Energy-efficient polling protocols in RFID systems Proc. of ACM MobiHoc.
[40]
Carsten Rolfes, Axel Poschmann, Gregor Leander, and Christof Paar 2008. Ultra-lightweight implementations for smart devices--security for 1000 gate equivalents CARDIS, Vol. Vol. 5189. Springer, 89--103.
[41]
Vahid Shah-Mansouri and Vincent WS Wong 2011. Cardinality estimation in RFID systems with multiple readers. IEEE Transactions on Wireless Communications, Vol. 10, 5 (2011), 1458--1469.
[42]
Muhammad Shahzad {n. d.}. RFID estimation tool. http://www4.ncsu.edu/ mshahza/publications.html. ( {n. d.}).
[43]
Muhammad Shahzad and Alex X Liu 2012. Every bit counts: fast and scalable RFID estimation Proc. of ACM MobiCom.
[44]
Muhammad Shahzad and Alex X Liu 2015. Expecting the unexpected: Fast and reliable detection of missing RFID tags in the wild Proc. of IEEE INFOCOM.
[45]
Muhammad Shahzad and Alex X Liu 2016. Fast and Reliable Detection and Identification of Missing RFID Tags in the Wild. IEEE/ACM Transactions on Networking Vol. 24, 6 (2016), 3770--3784.
[46]
Bo Sheng, Qun Li, and Weizhen Mao 2010. Efficient continuous scanning in RFID systems. In Proc. of IEEE INFOCOM.
[47]
Bo Sheng, Chiu Chiang Tan, Qun Li, and Weizhen Mao. 2008. Finding popular categories for RFID tags. In Proc. of ACM MobiHoc.
[48]
W-K Sze, W-C Lau, and O-C Yue 2009. Fast RFID counting under unreliable radio channels Proc. of IEEE ICC.
[49]
Chiu C Tan, Bo Sheng, and Qun Li 2008. How to monitor for missing RFID tags. In Proc. of IEEE ICDCS.
[50]
Chiu C Tan, Bo Sheng, and Qun Li 2010. Efficient techniques for monitoring missing RFID tags. IEEE Transactions on Wireless Communications, Vol. 9, 6 (2010), 1882--1889.
[51]
Jue Wang, Haitham Hassanieh, Dina Katabi, and Piotr Indyk 2012. Efficient and reliable low-power backscatter networks Proc. of ACM SIGCOM. ACM, 61--72.
[52]
Qingjun Xiao, Bin Xiao, and Shigang Chen 2013. Differential estimation in dynamic RFID systems. Proc. of IEEE INFOCOM.
[53]
Lei Xie, Hao Han, Qun Li, Jie Wu, and Sanglu Lu 2014. Efficiently collecting histograms over rfid tags. Proc. of IEEE INFOCOM.
[54]
Lei Xie, Qun Li, Xi Chen, Sanglu Lu, and Daoxu Chen 2013. Continuous scanning with mobile reader in RFID systems: An experimental study Proc. of ACM MobiHoc. ACM, 11--20.
[55]
Wei Xie, Lei Xie, Chen Zhang, Qiang Wang, Jian Xu, Quan Zhang, and Chaojing Tang 2014. RFID seeking: Finding a lost tag rather than only detecting its missing. Journal of Network and Computer Applications Vol. 42 (2014), 135--142.
[56]
Lei Yang, Yekui Chen, Xiang-Yang Li, Chaowei Xiao, Mo Li, and Yunhao Liu. 2014. Tagoram: real-time tracking of mobile RFID tags to high precision using COTS devices Proc. of ACM MobiCom.
[57]
Lei Yang, Yao Li, Qiongzheng Lin, Xiang-Yang Li, and Yunhao Liu 2016. Making sense of mechanical vibration period with sub-millisecond accuracy using backscatter signals. In Proc. of ACM MobiCom.
[58]
Hirotaka Yoshida, Dai Watanabe, Katsuyuki Okeya, Jun Kitahara, Hongjun Wu, Özgül Küccük, and Bart Preneel. 2007. MAME: A compression function with reduced hardware requirements International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 148--165.
[59]
Jihong Yu, Lin Chen, and Kehao Wang 2015. Finding Needles in a Haystack: Missing Tag Detection in Large RFID Systems. arXiv preprint arXiv:1512.05228 (2015).
[60]
Jihong Yu, Lin Chen, Rongrong Zhang, and Kehao Wang. 2016. On Missing Tag Detection in Multiple-group Multiple-region RFID Systems. IEEE Transactions on Mobile Computing (2016).
[61]
Y Yu, Y Yang, Y Fan, and H Min {n. d.}. Security Scheme for RFID Tag: Auto-ID Labs white paper WP-HARDWARE-022. http://www.autoidlabs.org/. ( {n. d.}).
[62]
Hong Zhang, Jeremy Gummeson, Benjamin Ransford, and Kevin Fu 2011. Moo: A batteryless computational RFID and sensing platform. University of Massachusetts Computer Science Technical Report UM-CS-2011-020 (2011).
[63]
Rui Zhang, Yunzhong Liu, Yanchao Zhang, and Jinyuan Sun. 2011. Fast identification of the missing tags in a large RFID system Proc. of IEEE SECON.
[64]
Yan Zhang, Laurence T Yang, and Jiming Chen 2009. RFID and sensor networks: architectures, protocols, security, and integrations. CRC Press.
[65]
Yuanqing Zheng and Mo Li 2013. Fast tag searching protocol for large-scale RFID systems. IEEE/ACM Transactions on Networking Vol. 21, 3 (2013), 924--934.
[66]
Yuanqing Zheng and Mo Li 2013. ZOE: Fast cardinality estimation for large-scale RFID systems Proc. of IEEE INFOCOM.
[67]
Yuanqing Zheng and Mo Li 2014. Towards more efficient cardinality estimation for large-scale RFID systems. IEEE/ACM Transactions on Networking Vol. 22, 6 (2014), 1886--1896.
[68]
Yuanqing Zheng and Mo Li 2015. P-mti: Physical-layer missing tag identification via compressive sensing. IEEE/ACM Transactions on Networking Vol. 23, 4 (2015), 1356--1366.

Cited By

View all
  • (2024)A Near-Optimal Protocol for Continuous Tag Recognition in Mobile RFID SystemsIEEE/ACM Transactions on Networking10.1109/TNET.2023.331787532:2(1303-1318)Online publication date: Apr-2024
  • (2024)Transfer Beamforming Via Beamforming for TransferIEEE Transactions on Mobile Computing10.1109/TMC.2023.3318741(1-14)Online publication date: 2024
  • (2024)Double Polling-Based Tag Information Collection for Sensor-Augmented RFID SystemsIEEE Transactions on Mobile Computing10.1109/TMC.2023.3277925(1-14)Online publication date: 2024
  • Show More Cited By

Index Terms

  1. Analog On-Tag Hashing: Towards Selective Reading as Hash Primitives in Gen2 RFID Systems

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MobiCom '17: Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking
      October 2017
      628 pages
      ISBN:9781450349161
      DOI:10.1145/3117811
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 October 2017

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. RFID
      2. epcglobal gen2
      3. hash function
      4. hash table function

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      MobiCom '17
      Sponsor:

      Acceptance Rates

      MobiCom '17 Paper Acceptance Rate 35 of 186 submissions, 19%;
      Overall Acceptance Rate 440 of 2,972 submissions, 15%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)30
      • Downloads (Last 6 weeks)3
      Reflects downloads up to 16 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)A Near-Optimal Protocol for Continuous Tag Recognition in Mobile RFID SystemsIEEE/ACM Transactions on Networking10.1109/TNET.2023.331787532:2(1303-1318)Online publication date: Apr-2024
      • (2024)Transfer Beamforming Via Beamforming for TransferIEEE Transactions on Mobile Computing10.1109/TMC.2023.3318741(1-14)Online publication date: 2024
      • (2024)Double Polling-Based Tag Information Collection for Sensor-Augmented RFID SystemsIEEE Transactions on Mobile Computing10.1109/TMC.2023.3277925(1-14)Online publication date: 2024
      • (2024)Efficiently Identifying Unknown COTS RFID Tags for Intelligent Transportation SystemsIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2023.328907225:1(987-997)Online publication date: Jan-2024
      • (2024)WaveKey: Secure Mobile Ad Hoc Access to RFID-Protected Systems2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS)10.1109/ICDCS60910.2024.00126(1342-1353)Online publication date: 23-Jul-2024
      • (2023)Revisiting Cardinality Estimation in COTS RFID SystemsProceedings of the 29th Annual International Conference on Mobile Computing and Networking10.1145/3570361.3613295(1-14)Online publication date: 2-Oct-2023
      • (2023)Go Beyond RFID: Rethinking the Design of RFID Sensor Tags for Versatile ApplicationsProceedings of the 29th Annual International Conference on Mobile Computing and Networking10.1145/3570361.3613284(1-16)Online publication date: 2-Oct-2023
      • (2023)mReader: Concurrent UHF RFID Tag ReadingProceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing10.1145/3565287.3610256(280-289)Online publication date: 23-Oct-2023
      • (2023)Secure UHF RFID Authentication With Smart DevicesIEEE Transactions on Wireless Communications10.1109/TWC.2022.322675322:7(4520-4533)Online publication date: Jul-2023
      • (2023)Rhythmic RFID AuthenticationIEEE/ACM Transactions on Networking10.1109/TNET.2022.320420431:2(877-890)Online publication date: Apr-2023
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      ePub

      View this article in ePub.

      ePub

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media