正在加载图片...
1310 IEEE COMMUNICATIONS SURVEYS TUTORIALS.VOL.16.NO.3.THIRD QUARTER 2014 [20]L.Yang,J.Han,Y.Qi,C.Wang,T.Gu,and Y.Liu,"Season:Shelving Areas Commun.,vol.24,no.2,pp.381-394,2006. interference and joint identification in large-scale rfid systems,"in Proc. [46]D.X.Song,D.Wagner,and A.Perrig."Practical techniques for searches 30th Annu.Joint Conf.of the IEEE Computer and Commun.Societies on encrypted data"in Proc.IEEE Symp.on Securiry and Privacy.2000. (INFOCOM).2011. [47]S.Wang.X.Ding.R.H.Deng,and F.Bao."Private information retrieval [21]B.Sheng.L.Q.and M.W."Efficient continuous scanning in rfid using trusted hardware,"in Proc.IIth European Symp.on Research in systems."in Proc.29th Annu.Joint Conf.of the IEEE Computer and Computer Security (ESORICS),2006. Commun.Societies (INFOCOM),2010. [48]Z.Yang,S.Zhong,and R.N.Wright,"Privacy-preserving queries on [22]L.Xie,B.Sheng,C.C.Tan,H.Han,Q.Li,and D.Chen,"Efficient tag encrypted data,"in Proc.IIth European Symp.on Research in Computer identification in mobile rfid systems,"in Proc.29th Annu.Joint Conf. Securiry (ESORICS),2006. of the IEEE Computer and Commun.Societies (INFOCOM),2010. [49]C.C.Tan,Q.Li,and L.Xie,"Privacy protection for rfid-based tracking [23]L.Xie,Q.Li,X.Chen,S.Lu,and D.Chen,"Continuous scanning systems,"in Proc.IEEE Int.Conf on RFID.2010. with mobile reader in rfid systems:An experimental study,"in Proc. [50]A.Poschmann,G.Leander,K.Schramm,and C.Paar,"New light- 14th ACM Int.Symp.on Mobile Ad Hoc Networking and Computing weight crypto algorithms for rfid,"in Proc.IEEE Int.Symp.on Circuits (MobiHoc),2013. and Systems (ISCAS),2007. [24]Y.Yin,L.Xie.J.Wu.A.V.Vasilakos,and S.Lu."Focus and shoot: [51]D.Hong.J.Sung.S.Hong.J.Lim,S.Lee,B.Koo,C.Lee.D.Chang Efficient identification over rfid tags in the specified area,"in Proc.Int. J.Lee,K.Jeong.H.Kim,H.Kim,and S.Chee,"Hight:A new block Conf.on Mobile and Ubiquitous Systems:Computing,Networking and cipher suitable for low-resource device,"in Proc.8th Int.Workshop on Services (MobiOuitous).2013. Cryptographic Hardware and Embedded Systems (CHES),2006. [25]M.Kodialam and T.Nandagopal,"Fast and reliable estimation schemes [52]H.Sun and W.Ting."A gen2-based rfid authentication protocol for in rfid systems,"in Proc.12th Annu.Int.Conf.Mobile Computing and security and privacy,"IEEE Trans.Mobile Comput.,vol.8.no.8,pp. Netw.(MobiCom),2006. 1052-1062,2009. [26]W.Chen,"An accurate tag estimate method for improving the perfor- [53]D.Molnar and D.Wagner,"Privacy and security in library rfid issues mance of an rfid anticollision algorithm based on dynamic frame length practices,and architectures,"in Proc.1Ith ACM conf.on Computer and aloha,"IEEE Trans.Automation Science and Engineering,vol.6,no.1, commun.security (CCS),2004. Pp.9-15.2009. [54]T.Dimitriou."A secure and efficient rfid protocol that could make big [27]H.Han,B.Sheng,C.C.Tan,Q.Li.W.Mao,and S.Lu,"Counting rfid brother (partially)obsolete,"in Proc.IEEE Int.I Conf on Pervasive tags efficiently and anonymously,"in Proc.29th Annu.Joint Conf.of Computing and Commun.(PerCom),2006. the IEEE Computer and Commun.Societies (INFOCOM),2010. [55]L.Lu,J.Han,L.Hu,Y.Liu,and L.Ni,"Dynamic key-updating:Privacy- [28]Q.Chen.H.Ngan.Y.Liu.and L.Ni,"Cardinality estimation for large- preserving authentication for rfid systems,"in Proc.IEEE Int.Conf.on scale rfid systems,"IEEE Trans.Parallel Distrib.Syst..vol.22.no.9. Pervasive Computing and Commun.(PerCom),2007. Pp.1441-1454.2011. [56]T.Li,W.Luo,Z.Mo,and S.Chen,"Privacy-preserving rfid authenti- [29]Q.Chen,Y.Liu,H.Ngan,and L.Ni,"Asap:Scalable identification and cation based on cryptographical encoding,"in Proc.IEEE INFOCOM counting for contactless rfid systems,"in Proc.30th IEEE Int.Conf.on 2012. Distrib.Computing Syst.(ICDCS),2010 [57]L.Lu,J.Han.R.Xiao,and Y.Liu,"Action:Breaking the privacy barrier [30]M.Shahzad and A.X.Liu,"Every bit counts:fast and scalable rfid for rfid systems,"in Proc.IEEE INFOCOM,2009. estimation,"in Proc.18th Annu.Int.Conf.on Mobile Computing and [58]M.Hoque,F.Rahman,and S.Ahamed,"Anonpri:An efficient anony- Networking (MobiCom),2012 mous private authentication protocol,"in Proc.IEEE Int.Conf.Pervasive [31]B.Sheng.C.C.Tan,Q.Li,and W.Mao,"Finding popular categories for Computing and Commun.(PerCom),2011. rfid tags,"in Proc.9th ACM Int.Symp.on Mobile Ad Hoc Networking [59]W.Gong,K.Liu.X.Miao,Q.Ma.Z.Yang.and Y.Liu,"Informative and Computing (MobiHoc).2008. counting:Fine-grained batch authentication for large-scale rfid systems," [32]M.Kodialam,T.Nandagopal,and W.Lau,"Anonymous tracking using in Proc.14th ACM Int.Symp.on Mobile ad hoc networking and rfid tags,"in Proc.26th Annu.Joint Conf.of the IEEE Computer and computing(MobiHoc以,2013. Commun.Societies (INFOCOM).2007. [60]K.Sakai,M.Sun,W.Ku,and T.Lai,"Randomized skip lists-based [33]T.Li,S.Chen,and Y.Ling,"Identifying the missing tags in a large rfid private authentication for large-scale rfid systems,"in Proc.14th ACM system,"in Proc.IIth ACM Int.Symp.on Mobile Ad Hoc Networking Int.Symp.on Mobile ad hoc networking and computing (MobiHoc). and Compuring (MobiHoc).2010. 2013 [34]Y.Qiao,S.Chen,T.Li,and S.Chen,"Energy-efficient polling protocols [61]Q.Yao,Y.Qi,J.Han,J.Zhao,X.Li,and Y.Liu,"Randomizing rfid in rfid systems,"in Proc.12th ACM Int.Symp.on M Mobile Ad Hoc private authentication,"in Proc.IEEE Int.Conf.Pervasive Computing Networking and Computing (MobiHoc),2011. and Commun.(PerCom),2009. [35]S.Chen,M.Zhang,and B.Xiao,"Efficient information collection [62]S.E.Sarma,S.A.Weis,and D.W.Engels,"Radio frequency identi- protocols for sensor-augmented rfid networks,"in Proc.30th Annu. fication:Secure risks and challenges."RSA Laboratories Cryptobytes. Joint Conf.of the IEEE Computer and Commun.Societies (INFOCOM), vol.6,no.1,Pp.2-9.2003. 2011. [63]S.A.Weis.S.E.Sarma.R.L.Rivest,and D.W.Engels,"Security and [36]L.Yang.J.Han.Y.Qi,and Y.Liu,"Identification-free batch authentica- privacy aspect s of low-cost radio frequency identification systems."in tion for rfid tags,"in Proc.18th IEEE Int.Conf.on Network Protocols Proc.Ist Int.Conf.on Securiry in Pervasive Computing (SPC),2003 (ICNP,2010. [64]M.Ohkubo,K.Suzuki.and S.Kinoshita,"Hash chain based forward [37]Y.Zheng and M.Li."Fast tag searching protocol for large-scale rfid secure privacy protection scheme for low cost rfid,"in Proc.Symp.on systems,"in Proc.19th IEEE Int.Conf:on Network Protocols (ICNP) Cryptography and Information Security (SCIS).2004. 2011. [65]S.Y.Seidel and T.S.Rappaport,"914mhz path loss prediction models [38]S.E.Sarma.S.A.Weis.and D.W.Engels,"Rfid systems and security for indoor wireless communications in multifloored buildings,"IEEE and privacy implications,"in Proc.4th Int.Workshop on Cryptographic Trans.Antennas Propag.,vol.40,no.2,pp.209-217,1992 Hardware and Embedded Systems (CHES),2002. [66]J.Hightower,G.Borriello,and R.Want,"Spoton:An indoor 3d location [39]S.Inoue and H.Yasuura,"Rfid privacy using user-controllable unique- sensing technology based on rf signal strength,"Univ.Washington,Tech. ness,"in Proc.RFID Privacy workshop,2003. Rep.,2000. [40]J.D.Krauss,Electromagnetics,4Ed.McGraw-Hill,1992 [67]X.Xiao,X.Jing,S.You,and J.Zeng,"An environmental-adaptive rssi [41]T.Lim,T.Li,and S.Yeo,"A cross-layer framework for privacy based indoor positioning approach using rfid,"in Proc.Int.Conf.on enhancement in rfid systems,"Pervasive and Mobile Computing,vol.4, Advanced Intelligence and Awarenss Internet,2010,pp.127-130. no.6.pp.889-905,2008. [68]J.Brchan,L.Zhao.J.Wu,R.Williams,and L.Perez,"A real-time rfid (42]A.Juels,R.L.Rivest,and M.Szydlo."The blocker tag:Selective localization experiment using propagation models,"in Proc.IEEE Int. blocking of rfid tags for consumer privacy,"in Proc.10th ACM Conf Conf.on RFID (RFID),2012,pp.141-148 on Computer and Commun.Securiry (CCS),2003. [69]Z.Yang,C.Wu,and Y.Liu,"Locating in fingerprint space:Wireless [43]L.Kulseng,Z.Yu,Y.Wei,and Y.Guan,"Lightweight mutual authentica- indoor localization with little human intervention,"in Proc.Proceedings tion and ownership transfer for rfid systems,"in Proc.IEEE INFOCOM IEEE MobiCOM,2012. 2010 170]A.Rai.K.K.Chintalapudi,V.N.Padmanabhan,and R.Sen."Zee:Zero- [44]K.Sakai,W.Ku.R.Zimmermann.and M.Sun."Dynamic bit encoding effort crowdsourcing for indoor localization,"in Proc.ACM MobiCoM, for privacy protection against correlation attacks in rfid backward 2012. channel,"IEEE Trans.Comput.,vol.62.no.1,pp.112-123.2013. [71]T.Deyle,H.Nguyen,M.Reynolds,and C.Kemp,"Rf vision:Rfid [45]A.Juels,"Rfid security and privacy:a research survey,"IEEE J.Sel. receive signal strength indicator (rssi)images for sensor fusion and1310 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 16, NO. 3, THIRD QUARTER 2014 [20] L. Yang, J. Han, Y. Qi, C. Wang, T. Gu, and Y. Liu, “Season: Shelving interference and joint identification in large-scale rfid systems,” in Proc. 30th Annu. Joint Conf. of the IEEE Computer and Commun. Societies (INFOCOM), 2011. [21] B. Sheng, L. Q, and M. W, “Efficient continuous scanning in rfid systems,” in Proc. 29th Annu. Joint Conf. of the IEEE Computer and Commun. Societies (INFOCOM), 2010. [22] L. Xie, B. Sheng, C. C. Tan, H. Han, Q. Li, and D. Chen, “Efficient tag identification in mobile rfid systems,” in Proc. 29th Annu. Joint Conf. of the IEEE Computer and Commun. Societies (INFOCOM), 2010. [23] L. Xie, Q. Li, X. Chen, S. Lu, and D. Chen, “Continuous scanning with mobile reader in rfid systems: An experimental study,” in Proc. 14th ACM Int. Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc), 2013. [24] Y. Yin, L. Xie, J. Wu, A. V. Vasilakos, and S. Lu, “Focus and shoot: Efficient identification over rfid tags in the specified area,” in Proc. Int. Conf. on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous), 2013. [25] M. Kodialam and T. Nandagopal, “Fast and reliable estimation schemes in rfid systems,” in Proc. 12th Annu. Int. Conf. Mobile Computing and Netw. (MobiCom), 2006. [26] W. Chen, “An accurate tag estimate method for improving the perfor￾mance of an rfid anticollision algorithm based on dynamic frame length aloha,” IEEE Trans. Automation Science and Engineering, vol. 6, no. 1, pp. 9–15, 2009. [27] H. Han, B. Sheng, C. C. Tan, Q. Li, W. Mao, and S. Lu, “Counting rfid tags efficiently and anonymously,” in Proc. 29th Annu. Joint Conf. of the IEEE Computer and Commun. Societies (INFOCOM), 2010. [28] Q. Chen, H. Ngan, Y. Liu, and L. Ni, “Cardinality estimation for large￾scale rfid systems,” IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 9, pp. 1441–1454, 2011. [29] Q. Chen, Y. Liu, H. Ngan, and L. Ni, “Asap: Scalable identification and counting for contactless rfid systems,” in Proc. 30th IEEE Int. Conf. on Distrib. Computing Syst. (ICDCS), 2010. [30] M. Shahzad and A. X. Liu, “Every bit counts: fast and scalable rfid estimation,” in Proc. 18th Annu. Int. Conf. on Mobile Computing and Networking (MobiCom), 2012. [31] B. Sheng, C. C. Tan, Q. Li, and W. Mao, “Finding popular categories for rfid tags,” in Proc. 9th ACM Int. Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc), 2008. [32] M. Kodialam, T. Nandagopal, and W. Lau, “Anonymous tracking using rfid tags,” in Proc. 26th Annu. Joint Conf. of the IEEE Computer and Commun. Societies (INFOCOM), 2007. [33] T. Li, S. Chen, and Y. Ling, “Identifying the missing tags in a large rfid system,” in Proc. 11th ACM Int. Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc), 2010. [34] Y. Qiao, S. Chen, T. Li, and S. Chen, “Energy-efficient polling protocols in rfid systems,” in Proc. 12th ACM Int. Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc), 2011. [35] S. Chen, M. Zhang, and B. Xiao, “Efficient information collection protocols for sensor- augmented rfid networks,” in Proc. 30th Annu. Joint Conf. of the IEEE Computer and Commun. Societies (INFOCOM), 2011. [36] L. Yang, J. Han, Y. Qi, and Y. Liu, “Identification-free batch authentica￾tion for rfid tags,” in Proc. 18th IEEE Int. Conf. on Network Protocols (ICNP), 2010. [37] Y. Zheng and M. Li, “Fast tag searching protocol for large-scale rfid systems,” in Proc. 19th IEEE Int. Conf. on Network Protocols (ICNP), 2011. [38] S. E. Sarma, S. A. Weis, and D. W. Engels, “Rfid systems and security and privacy implications,” in Proc. 4th Int. Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2002. [39] S. Inoue and H. Yasuura, “Rfid privacy using user-controllable unique￾ness,” in Proc. RFID Privacy workshop, 2003. [40] J. D. Krauss, Electromagnetics, 4Ed. McGraw-Hill, 1992. [41] T. Lim, T. Li, and S. Yeo, “A cross-layer framework for privacy enhancement in rfid systems,” Pervasive and Mobile Computing, vol. 4, no. 6, pp. 889–905, 2008. [42] A. Juels, R. L. Rivest, and M. Szydlo, “The blocker tag: Selective blocking of rfid tags for consumer privacy,” in Proc. 10th ACM Conf. on Computer and Commun. Security (CCS), 2003. [43] L. Kulseng, Z. Yu, Y. Wei, and Y. Guan, “Lightweight mutual authentica￾tion and ownership transfer for rfid systems,” in Proc. IEEE INFOCOM, 2010. [44] K. Sakai, W. Ku, R. Zimmermann, and M. Sun, “Dynamic bit encoding for privacy protection against correlation attacks in rfid backward channel,” IEEE Trans. Comput., vol. 62, no. 1, pp. 112–123, 2013. [45] A. Juels, “Rfid security and privacy: a research survey,” IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 381–394, 2006. [46] D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Proc. IEEE Symp. on Security and Privacy, 2000. [47] S. Wang, X. Ding, R. H. Deng, and F. Bao, “Private information retrieval using trusted hardware,” in Proc. 11th European Symp. on Research in Computer Security (ESORICS), 2006. [48] Z. Yang, S. Zhong, and R. N. Wright, “Privacy-preserving queries on encrypted data,” in Proc. 11th European Symp. on Research in Computer Security (ESORICS), 2006. [49] C. C. Tan, Q. Li, and L. Xie, “Privacy protection for rfid-based tracking systems,” in Proc. IEEE Int. Conf. on RFID, 2010. [50] A. Poschmann, G. Leander, K. Schramm, and C. Paar, “New light￾weight crypto algorithms for rfid,” in Proc. IEEE Int. Symp. on Circuits and Systems (ISCAS), 2007. [51] D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim, H. Kim, and S. Chee, “Hight: A new block cipher suitable for low-resource device,” in Proc. 8th Int. Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2006. [52] H. Sun and W. Ting, “A gen2-based rfid authentication protocol for security and privacy,” IEEE Trans. Mobile Comput., vol. 8, no. 8, pp. 1052–1062, 2009. [53] D. Molnar and D. Wagner, “Privacy and security in library rfid issues, practices, and architectures,” in Proc. 11th ACM conf. on Computer and commun. security (CCS), 2004. [54] T. Dimitriou, “A secure and efficient rfid protocol that could make big brother (partially) obsolete,” in Proc. IEEE Int.l Conf. on Pervasive Computing and Commun. (PerCom), 2006. [55] L. Lu, J. Han, L. Hu, Y. Liu, and L. Ni, “Dynamic key-updating: Privacy￾preserving authentication for rfid systems,” in Proc. IEEE Int. Conf. on Pervasive Computing and Commun. (PerCom), 2007. [56] T. Li, W. Luo, Z. Mo, and S. Chen, “Privacy-preserving rfid authenti￾cation based on cryptographical encoding,” in Proc. IEEE INFOCOM, 2012. [57] L. Lu, J. Han, R. Xiao, and Y. Liu, “Action: Breaking the privacy barrier for rfid systems,” in Proc. IEEE INFOCOM, 2009. [58] M. Hoque, F. Rahman, and S. Ahamed, “Anonpri: An efficient anony￾mous private authentication protocol,” in Proc. IEEE Int. Conf. Pervasive Computing and Commun. (PerCom), 2011. [59] W. Gong, K. Liu, X. Miao, Q. Ma, Z. Yang, and Y. Liu, “Informative counting: Fine-grained batch authentication for large-scale rfid systems,” in Proc. 14th ACM Int. Symp. on Mobile ad hoc networking and computing (MobiHoc), 2013. [60] K. Sakai, M. Sun, W. Ku, and T. Lai, “Randomized skip lists-based private authentication for large-scale rfid systems,” in Proc. 14th ACM Int. Symp. on Mobile ad hoc networking and computing (MobiHoc), 2013. [61] Q. Yao, Y. Qi, J. Han, J. Zhao, X. Li, and Y. Liu, “Randomizing rfid private authentication,” in Proc. IEEE Int. Conf. Pervasive Computing and Commun. (PerCom), 2009. [62] S. E. Sarma, S. A. Weis, and D. W. Engels, “Radio frequency identi- fication: Secure risks and challenges,” RSA Laboratories Cryptobytes, vol. 6, no. 1, pp. 2–9, 2003. [63] S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, “Security and privacy aspect s of low-cost radio frequency identification systems,” in Proc. 1st Int. Conf. on Security in Pervasive Computing (SPC), 2003. [64] M. Ohkubo, K. Suzuki, and S. Kinoshita, “Hash chain based forward secure privacy protection scheme for low cost rfid,” in Proc. Symp. on Cryptography and Information Security (SCIS), 2004. [65] S. Y. Seidel and T. S. Rappaport, “914mhz path loss prediction models for indoor wireless communications in multifloored buildings,” IEEE Trans. Antennas Propag., vol. 40, no. 2, pp. 209–217, 1992. [66] J. Hightower, G. Borriello, and R. Want, “Spoton: An indoor 3d location sensing technology based on rf signal strength,” Univ. Washington, Tech. Rep., 2000. [67] X. Xiao, X. Jing, S. You, and J. Zeng, “An environmental-adaptive rssi based indoor positioning approach using rfid,” in Proc. Int. Conf. on Advanced Intelligence and Awarenss Internet, 2010, pp. 127–130. [68] J. Brchan, L. Zhao, J. Wu, R. Williams, and L. Perez, “A real-time rfid localization experiment using propagation models,” in Proc. IEEE Int. Conf. on RFID (RFID), 2012, pp. 141–148. [69] Z. Yang, C. Wu, and Y. Liu, “Locating in fingerprint space: Wireless indoor localization with little human intervention,” in Proc. Proceedings IEEE MobiCOM, 2012. [70] A. Rai, K. K. Chintalapudi, V. N. Padmanabhan, and R. Sen, “Zee: Zero￾effort crowdsourcing for indoor localization,” in Proc. ACM MobiCOM, 2012. [71] T. Deyle, H. Nguyen, M. Reynolds, and C. Kemp, “Rf vision: Rfid receive signal strength indicator (rssi) images for sensor fusion and
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有