IEEE/ACM TRANSACTIONS ON NETWORKING 14 [7]C.Angerer,R.Langwieser,and M.Rupp,"Rfid reader receivers for (34]A.Poschmann,G.Leander,K.Schramm,and C.Paar,"New lightweight physical layer collision recovery,"IEEE Transactions on Communica- des variants suited for rfid applications,"in FSE,vol.4593,2007,pp tions,.vol.58,no.12,Pp.3526-3537,2010. 196-210. [8]D.Shen.G.Woo.D.P.Reed.A.B.Lippman,and J.Wang."Separation [35]H.Yoshida,D.Watanabe,K.Okeya,J.Kitahara,H.Wu,O.Kiicuik, of multiple passive rfid signals using software defined radio,"in Proc. and B.Preneel,"Mame:A compression function with reduced hardware of IEEE RFID.2009. requirements"in International Workshop on Cryptographic Hardware [9]A.Bletsas,J.Kimionis,A.G.Dimitriou,and G.N.Karystinos, and Embedded Systems.Springer,2007.pp.148-165. "Single-antenna coherent detection of collided fmo rfid signals,"/EEE (36]A.Bogdanov,L.R.Knudsen,G.Leander,C.Paar.A.Poschmann,M.J. Transactions on Communications,vol.60.no.3,pp.756-766.2012. Robshaw,Y.Seurin,and C.Vikkelsoe,"Present:An ultra-lightweight [10]P.Hu,P.Zhang,and D.Ganesan,"Leveraging interleaved signal edges block cipher,"in CHES.vol.4727.Springer.2007,pp.450-466. for concurrent backscatter,"in Proc.of ACM HotWireless,2014. (37]C.Rolfes,A.Poschmann.G.Leander,and C.Paar,"Ultra-lightweight [11]R.S.Khasgiwale,R.U.Adyanthaya,and D.W.Engels,"Extracting implementations for smart devices-security for 1000 gate equivalents," information from tag collisions,"in Proc.of IEEE RFID,2009 in CARD/S,vol.5189.Springer,2008,pp.89-103. [12]L.Kang,K.Wu,J.Zhang,H.Tan,and L.Ni,"Ddc:A novel scheme to [38]C.H.Lim and T.Korkishko,"mcrypton-a lightweight block cipher for directly decode the collisions in uhf rfid systems,"IEEE Transactions security of low-cost rfid tags and sensors,"in WISA,vol.3786.Springer, on Parallel and Distributed Systems,vol.23.no.2,pp.263-270,2012. 2005,pp.243-258. [13]L.Kong,L.He.Y.Gu,M.-Y.Wu,and T.He,"A parallel identification [39]Y.Yu,Y.Yang,Y.Fan,and H.Min,"Security scheme for rfid tag:Auto- protocol for rfid systems,"in Proc.of IEEE INFOCOM,2014. id labs white paper wp-hardware-022,"http://www.autoidlabs.org/. [14]R.Zhao,F.Zhu.Y.Feng.S.Peng.X.Tian.H.Yu.and X.Wang. [40]D.Hong.J.Sung.S.Hong.J.Lim,S.Lee,B.Koo,C.Lee,D.Chang. "Ofdma-enabled wi-fi backscatter,"in Proc.of ACM MobiCom,2019. J.Lee,K.Jeong et al.,"Hight:A new block cipher suitable for low pp.1-15. resource device,"in CHES,vol.4249.Springer,2006,pp.46-59. [15]X.Tong.F.Zhu,Y.Wan,X.Tian,and X.Wang."Batch localization (41]T.Good and M.Benaissa,"Hardware results for selected stream cipher based on ofdma backscatter,"in Proc.of ACM UbiComp,vol.3,no.1, candidates,"State of the Art of Stream Ciphers,vol.7,pp.191-204 2019,Pp.1-25. 2007. [16]B.Sheng.Q.Li,and W.Mao,"Efficient continuous scanning in rfid [42]M.Feldhofer and C.Rechberger,"A case against currently used hash systems,"in Proc.of IEEE INFOCOM,2010. functions in rfid protocols,"in On the move to meaningful interner [17]L.Xie,Q.Li,X.Chen,S.Lu,and D.Chen,"Continuous scanning with system西2006:OTM2006 workshops. Springer,2006,pp.372-381. mobile reader in rfid systems:An experimental study,"in Proc.of ACM [43]L.Yang,Q.Lin,C.Duan,and Z.An,"Analog on-tag hashing:Towards MobiHoc.ACM,2013,pp.11-20. selective reading as hash primitives in gen2 rfid systems,"arXiv preprint [18]H.Liu,W.Gong.X.Miao.K.Liu.and W.He."Towards adaptive arXi:1707.08883.2017 continuous scanning in large-scale rfid systems,"in Proc.of /EEE [44]Q.Lin,L.Yang,C.Duan,and Y.Liu,"Revisiting reading rate with INFOCOM.2014. mobility:Rate-adaptive reading of cots rfid systems,"IEEE Transactions [19]T.Li.S.Chen,and Y.Ling,"Identifying the missing tags in a large rfid on Mobile Computing,2018. system,"in Proc.of ACM MobiHoc,2010. [45]Q.Lin,L.Yang.H.Jia,C.Duan,and Y.Liu,"Revisiting reading [20]W.Luo,S.Chen,T.Li,and S.Chen,"Efficient missing tag detection rate with mobility:Rate-adaptive reading in cots rfid systems,"in Pro- in rfid systems,"in Proc.of IEEE INFOCOM,2011. ceedings of the 13th International Conference on emerging Networking [21]R.Zhang.Y.Liu.Y.Zhang.and J.Sun,"Fast identification of the EXperiments and Technologies.ACM,2017,pp.199-211 missing tags in a large rfid system,"in Proc.of IEEE SECON,2011. 46]A.Broder and M.Mitzenmacher,"Network applications of bloom filters: [22]W.Luo,S.Chen,T.Li,and Y.Qiao,"Probabilistic missing-tag detection A survey,"Internet Mathematics,vol.1.no.4,pp.485-509,2004. [47] "EPCglobal Gen2 Specification,"www.gs1.org/epcglobal,2004. and energy-time tradeoff in large-scale rfid systems,"in Proceedings [48] of the thirteenth ACM international symposium on Mobile Ad Hoc "ImpinJ,Inc,"http://www.impinj.com/,2017. Networking and Computing.ACM,2012.pp.95-104 [49]"Alien,"http://www.alientechnology.com,2017 [23]Y.Zheng and M.Li,"P-mti:Physical-layer missing tag identification via (50]"NXP,"https://nxp-rfid.com/products/ucode/. compressive sensing."IEEE/ACM Transactions on Networking.vol.23. [51] "USRP."https://www.ettus.com/. 52]N.Kargas,F.Mavromatis,and A.Bletsas,"Fully-coherent reader with no.4,pp.1356-1366.2015. commodity sdr for gen2 fmo and computational rfid,"IEEE Wireless [24]C.C.Tan,B.Sheng,and Q.Li,"Efficient techniques for monitoring missing rfid tags."IEEE Transactions on Wireless Communications, Communications Letters,vol.4.no.6,pp.617-620.2015. vol.9,no.6,Pp.1882-1889,2010. [53] "Source Code,"https://github.com/Anplus/TagMap. [54]"ImpinJ Inc.History,"https://en.wikipedia.org/wiki/Impinj. [25]T.Li,S.Chen,and Y.Ling,"Efficient protocols for identifying the miss- [55]C.Qian,H.Ngan,Y.Liu,and L.M.Ni,"Cardinality estimation for ing tags in a large rfid system,"IEEE/ACM Transactions on Networking, vol.21,no.6,pp.1974-1987,2013. large-scale rfid systems,"IEEE transactions on parallel and distributed [26]X.Liu,K.Li,G.Min,Y.Shen,A.X.Liu,and W.Qu,"A multiple systems,vol.22,no.9,Pp.1441-1454,2011 (56]Y.Zheng and M.Li,"Fast tag searching protocol for large-scale rfid hashing approach to complete identification of missing rfid tags,"/EEE systems,"IEEE/ACM Transactions on Networking(TON),vol.21,no.3. Transactions on Communications,vol.62,no.3,pp.1046-1057,2014 Pp.924-934,2013. [27]W.Luo.S.Chen.Y.Qiao,and T.Li,"Missing-tag detection and energy- [57]S.Chen,M.Zhang,and B.Xiao,"Efficient information collection proto- time tradeoff in large-scale rfid systems with unreliable channels," cols for sensor-augmented rfid networks,"in Proc.of IEEE INFOCOM, IEEE/ACM Transactions on Networking,vol.22,no.4,pp.1079-1091 2011. 2014. (58]L.Yang,J.Han,Y.Qi,C.Wang,T.Gu,and Y.Liu,"Season:Shelving [28]C.Ma,J.Lin,and Y.Wang."Efficient missing tag detection in a large interference and joint identification in large-scale rfid systems,"in 20// rfid system,"in Proc.of IEEE TrustCom,2012. Proceedings IEEE INFOCOM.IEEE,2011,pp.3092-3100. [29]W.Xie,L.Xie,C.Zhang,Q.Wang.J.Xu,Q.Zhang,and C.Tang, [59]J.Ou,M.Li,and Y.Zheng,"Come and be served:Parallel decoding "Rfid seeking:Finding a lost tag rather than only detecting its missing,' for cots rfid tags,"in Proceedings of the 21st Annual International Journal of Network and Computer Applications,vol.42.pp.135-142. Conference on Mobile Computing and Networking.ACM,2015,pp. 2014. 500-511. [30]M.Shahzad and A.X.Liu,"Expecting the unexpected:Fast and reliable detection of missing rfid tags in the wild,"in Proc.of IEEE INFOCOM. 2015. [31]J.Yu,L.Chen,R.Zhang,and K.Wang,"On missing tag detection in multiple-group multiple-region rfid systems,"IEEE Transactions on Mobile Computing,2016. [32]J.Yu,L.Chen,and K.Wang,"Finding needles in a haystack:Missing tag detection in large rfid systems,"arXiv preprint arXiv:1512.05228. 2015 [33]M.Shahzad and A.X.Liu,"Fast and reliable detection and identifi- cation of missing rfid tags in the wild."IEEE/ACM Transacrions on Nenworking,vol.24,no.6,pp.3770-3784,2016.IEEE/ACM TRANSACTIONS ON NETWORKING 14 [7] C. Angerer, R. Langwieser, and M. Rupp, “Rfid reader receivers for physical layer collision recovery,” IEEE Transactions on Communications, vol. 58, no. 12, pp. 3526–3537, 2010. [8] D. Shen, G. Woo, D. P. Reed, A. B. Lippman, and J. Wang, “Separation of multiple passive rfid signals using software defined radio,” in Proc. of IEEE RFID, 2009. [9] A. Bletsas, J. Kimionis, A. G. Dimitriou, and G. N. Karystinos, “Single-antenna coherent detection of collided fm0 rfid signals,” IEEE Transactions on Communications, vol. 60, no. 3, pp. 756–766, 2012. [10] P. Hu, P. Zhang, and D. Ganesan, “Leveraging interleaved signal edges for concurrent backscatter,” in Proc. of ACM HotWireless, 2014. [11] R. S. Khasgiwale, R. U. Adyanthaya, and D. W. Engels, “Extracting information from tag collisions,” in Proc. of IEEE RFID, 2009. [12] L. Kang, K. Wu, J. Zhang, H. Tan, and L. Ni, “Ddc: A novel scheme to directly decode the collisions in uhf rfid systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 2, pp. 263–270, 2012. [13] L. Kong, L. He, Y. Gu, M.-Y. Wu, and T. He, “A parallel identification protocol for rfid systems,” in Proc. of IEEE INFOCOM, 2014. [14] R. Zhao, F. Zhu, Y. Feng, S. Peng, X. Tian, H. Yu, and X. Wang, “Ofdma-enabled wi-fi backscatter,” in Proc. of ACM MobiCom, 2019, pp. 1–15. [15] X. Tong, F. Zhu, Y. Wan, X. Tian, and X. Wang, “Batch localization based on ofdma backscatter,” in Proc. of ACM UbiComp, vol. 3, no. 1, 2019, pp. 1–25. [16] B. Sheng, Q. Li, and W. Mao, “Efficient continuous scanning in rfid systems,” in Proc. of IEEE INFOCOM, 2010. [17] L. Xie, Q. Li, X. Chen, S. Lu, and D. Chen, “Continuous scanning with mobile reader in rfid systems: An experimental study,” in Proc. of ACM MobiHoc. ACM, 2013, pp. 11–20. [18] H. Liu, W. Gong, X. Miao, K. Liu, and W. He, “Towards adaptive continuous scanning in large-scale rfid systems,” in Proc. of IEEE INFOCOM, 2014. [19] T. Li, S. Chen, and Y. Ling, “Identifying the missing tags in a large rfid system,” in Proc. of ACM MobiHoc, 2010. [20] W. Luo, S. Chen, T. Li, and S. Chen, “Efficient missing tag detection in rfid systems,” in Proc. of IEEE INFOCOM, 2011. [21] R. Zhang, Y. Liu, Y. Zhang, and J. Sun, “Fast identification of the missing tags in a large rfid system,” in Proc. of IEEE SECON, 2011. [22] W. Luo, S. Chen, T. Li, and Y. Qiao, “Probabilistic missing-tag detection and energy-time tradeoff in large-scale rfid systems,” in Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing. ACM, 2012, pp. 95–104. [23] Y. Zheng and M. Li, “P-mti: Physical-layer missing tag identification via compressive sensing,” IEEE/ACM Transactions on Networking, vol. 23, no. 4, pp. 1356–1366, 2015. [24] C. C. Tan, B. Sheng, and Q. Li, “Efficient techniques for monitoring missing rfid tags,” IEEE Transactions on Wireless Communications, vol. 9, no. 6, pp. 1882–1889, 2010. [25] T. Li, S. Chen, and Y. Ling, “Efficient protocols for identifying the missing tags in a large rfid system,” IEEE/ACM Transactions on Networking, vol. 21, no. 6, pp. 1974–1987, 2013. [26] X. Liu, K. Li, G. Min, Y. Shen, A. X. Liu, and W. Qu, “A multiple hashing approach to complete identification of missing rfid tags,” IEEE Transactions on Communications, vol. 62, no. 3, pp. 1046–1057, 2014. [27] W. Luo, S. Chen, Y. Qiao, and T. Li, “Missing-tag detection and energy– time tradeoff in large-scale rfid systems with unreliable channels,” IEEE/ACM Transactions on Networking, vol. 22, no. 4, pp. 1079–1091, 2014. [28] C. Ma, J. Lin, and Y. Wang, “Efficient missing tag detection in a large rfid system,” in Proc. of IEEE TrustCom, 2012. [29] W. Xie, L. Xie, C. Zhang, Q. Wang, J. Xu, Q. Zhang, and C. Tang, “Rfid seeking: Finding a lost tag rather than only detecting its missing,” Journal of Network and Computer Applications, vol. 42, pp. 135–142, 2014. [30] M. Shahzad and A. X. Liu, “Expecting the unexpected: Fast and reliable detection of missing rfid tags in the wild,” in Proc. of IEEE INFOCOM, 2015. [31] J. Yu, L. Chen, R. Zhang, and K. Wang, “On missing tag detection in multiple-group multiple-region rfid systems,” IEEE Transactions on Mobile Computing, 2016. [32] J. Yu, L. Chen, and K. Wang, “Finding needles in a haystack: Missing tag detection in large rfid systems,” arXiv preprint arXiv:1512.05228, 2015. [33] M. Shahzad and A. X. Liu, “Fast and reliable detection and identifi- cation of missing rfid tags in the wild,” IEEE/ACM Transactions on Networking, vol. 24, no. 6, pp. 3770–3784, 2016. [34] A. Poschmann, G. Leander, K. Schramm, and C. Paar, “New lightweight des variants suited for rfid applications,” in FSE, vol. 4593, 2007, pp. 196–210. [35] H. Yoshida, D. Watanabe, K. Okeya, J. Kitahara, H. Wu, O. K ¨ uc¸¨ uk, ¨ and B. Preneel, “Mame: A compression function with reduced hardware requirements,” in International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 2007, pp. 148–165. [36] A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. Robshaw, Y. Seurin, and C. Vikkelsoe, “Present: An ultra-lightweight block cipher,” in CHES, vol. 4727. Springer, 2007, pp. 450–466. [37] C. Rolfes, A. Poschmann, G. Leander, and C. Paar, “Ultra-lightweight implementations for smart devices–security for 1000 gate equivalents,” in CARDIS, vol. 5189. Springer, 2008, pp. 89–103. [38] C. H. Lim and T. Korkishko, “mcrypton-a lightweight block cipher for security of low-cost rfid tags and sensors,” in WISA, vol. 3786. Springer, 2005, pp. 243–258. [39] Y. Yu, Y. Yang, Y. Fan, and H. Min, “Security scheme for rfid tag: Autoid labs white paper wp-hardware-022,” http://www.autoidlabs.org/. [40] D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. Koo, C. Lee, D. Chang, J. Lee, K. Jeong et al., “Hight: A new block cipher suitable for lowresource device,” in CHES, vol. 4249. Springer, 2006, pp. 46–59. [41] T. Good and M. Benaissa, “Hardware results for selected stream cipher candidates,” State of the Art of Stream Ciphers, vol. 7, pp. 191–204, 2007. [42] M. Feldhofer and C. Rechberger, “A case against currently used hash functions in rfid protocols,” in On the move to meaningful internet systems 2006: OTM 2006 workshops. Springer, 2006, pp. 372–381. [43] L. Yang, Q. Lin, C. Duan, and Z. An, “Analog on-tag hashing: Towards selective reading as hash primitives in gen2 rfid systems,” arXiv preprint arXiv:1707.08883, 2017. [44] Q. Lin, L. Yang, C. Duan, and Y. Liu, “Revisiting reading rate with mobility: Rate-adaptive reading of cots rfid systems,” IEEE Transactions on Mobile Computing, 2018. [45] Q. Lin, L. Yang, H. Jia, C. Duan, and Y. Liu, “Revisiting reading rate with mobility: Rate-adaptive reading in cots rfid systems,” in Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies. ACM, 2017, pp. 199–211. [46] A. Broder and M. Mitzenmacher, “Network applications of bloom filters: A survey,” Internet Mathematics, vol. 1, no. 4, pp. 485–509, 2004. [47] “EPCglobal Gen2 Specification,” www.gs1.org/epcglobal, 2004. [48] “ImpinJ, Inc,” http://www.impinj.com/, 2017. [49] “Alien,” http://www.alientechnology.com, 2017. [50] “NXP,” https://nxp-rfid.com/products/ucode/. [51] “USRP,” https://www.ettus.com/. [52] N. Kargas, F. Mavromatis, and A. Bletsas, “Fully-coherent reader with commodity sdr for gen2 fm0 and computational rfid,” IEEE Wireless Communications Letters, vol. 4, no. 6, pp. 617–620, 2015. [53] “Source Code,” https://github.com/Anplus/TagMap. [54] “ImpinJ Inc. History,” https://en.wikipedia.org/wiki/Impinj. [55] C. Qian, H. Ngan, Y. Liu, and L. M. Ni, “Cardinality estimation for large-scale rfid systems,” IEEE transactions on parallel and distributed systems, vol. 22, no. 9, pp. 1441–1454, 2011. [56] Y. Zheng and M. Li, “Fast tag searching protocol for large-scale rfid systems,” IEEE/ACM Transactions on Networking (TON), vol. 21, no. 3, pp. 924–934, 2013. [57] S. Chen, M. Zhang, and B. Xiao, “Efficient information collection protocols for sensor-augmented rfid networks,” in Proc. of IEEE INFOCOM, 2011. [58] L. Yang, J. Han, Y. Qi, C. Wang, T. Gu, and Y. Liu, “Season: Shelving interference and joint identification in large-scale rfid systems,” in 2011 Proceedings IEEE INFOCOM. IEEE, 2011, pp. 3092–3100. [59] J. Ou, M. Li, and Y. Zheng, “Come and be served: Parallel decoding for cots rfid tags,” in Proceedings of the 21st Annual International Conference on Mobile Computing and Networking. ACM, 2015, pp. 500–511