Data Verification in Integrated RFID Systems
Radio frequency identification (RFID) is widely used as a tagging system to facilitate physical transactions in the real world. Thanks to the availability of inexpensive passive RF tags, RFID technology is now the catalyst of Internet of Things, i.e., every object can be uniquely identified in an In...
Gespeichert in:
Veröffentlicht in: | IEEE systems journal 2019-06, Vol.13 (2), p.1969-1980 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1980 |
---|---|
container_issue | 2 |
container_start_page | 1969 |
container_title | IEEE systems journal |
container_volume | 13 |
creator | Sakai, Kazuya Sun, Min-Te Ku, Wei-Shinn Lu, Hua Lai, Ten H. |
description | Radio frequency identification (RFID) is widely used as a tagging system to facilitate physical transactions in the real world. Thanks to the availability of inexpensive passive RF tags, RFID technology is now the catalyst of Internet of Things, i.e., every object can be uniquely identified in an Internet-like way. In the future, many individual RFID systems are likely to be integrated into a few exascale RFID systems. In an integrated RFID system, service providers (SPs) that offer RFID-based data service and clients that use the data service are different organizations. As a consequence, quality of data in terms of authenticity is of significant concern. In this paper, we first formulate a data verification problem in RFID systems and build a model of integrated RFID systems where multiple SPs and clients exist. Then, we propose two data verification protocols to ensure data generated by SPs associated with a particular tag and has not been modified. In addition, we implement our system as a prototype. The computer simulations, analyses, and testbeds based on the prototype all demonstrate that the proposed verifiable integrated RFID system achieves a high level of security and performance. |
doi_str_mv | 10.1109/JSYST.2018.2865571 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_8458363</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8458363</ieee_id><sourcerecordid>2235829287</sourcerecordid><originalsourceid>FETCH-LOGICAL-c339t-9b3866dfe2272da9ea63db59de6f71d042218f13ff442c7338f74aa8116e8cac3</originalsourceid><addsrcrecordid>eNo9kEtLAzEUhYMoWKt_QDcDbp2a3LyXUq1WCoKtgquQztzIFDtTk3TRf29fuDp3cb574CPkmtEBY9Tev06_prMBUGYGYJSUmp2QHrNclxa4ON3fUBpmxDm5SGlBqTRS2x65e_TZF58Ym9BUPjddWzRtMW4zfkefsS7eR-PHYrpJGZfpkpwF_5Pw6ph98jF6mg1fysnb83j4MCkrzm0u7ZwbpeqAABpqb9ErXs-lrVEFzWoqAJgJjIcgBFSacxO08N4wptBUvuJ9cnv4u4rd7xpTdotuHdvtpAPg0oAFo7ctOLSq2KUUMbhVbJY-bhyjbmfF7a24nRV3tLKFbg5Qg4j_gBHScMX5HwiNXK0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2235829287</pqid></control><display><type>article</type><title>Data Verification in Integrated RFID Systems</title><source>IEEE Electronic Library (IEL)</source><creator>Sakai, Kazuya ; Sun, Min-Te ; Ku, Wei-Shinn ; Lu, Hua ; Lai, Ten H.</creator><creatorcontrib>Sakai, Kazuya ; Sun, Min-Te ; Ku, Wei-Shinn ; Lu, Hua ; Lai, Ten H.</creatorcontrib><description>Radio frequency identification (RFID) is widely used as a tagging system to facilitate physical transactions in the real world. Thanks to the availability of inexpensive passive RF tags, RFID technology is now the catalyst of Internet of Things, i.e., every object can be uniquely identified in an Internet-like way. In the future, many individual RFID systems are likely to be integrated into a few exascale RFID systems. In an integrated RFID system, service providers (SPs) that offer RFID-based data service and clients that use the data service are different organizations. As a consequence, quality of data in terms of authenticity is of significant concern. In this paper, we first formulate a data verification problem in RFID systems and build a model of integrated RFID systems where multiple SPs and clients exist. Then, we propose two data verification protocols to ensure data generated by SPs associated with a particular tag and has not been modified. In addition, we implement our system as a prototype. The computer simulations, analyses, and testbeds based on the prototype all demonstrate that the proposed verifiable integrated RFID system achieves a high level of security and performance.</description><identifier>ISSN: 1932-8184</identifier><identifier>EISSN: 1937-9234</identifier><identifier>DOI: 10.1109/JSYST.2018.2865571</identifier><identifier>CODEN: ISJEB2</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Automatic identification ; Clients ; Computer simulation ; Data security ; Internet of Things ; Organizations ; Protocol (computers) ; Protocols ; Radio frequency ; Radio frequency identification ; Radiofrequency identification ; RFID tags ; Servers ; Tagging</subject><ispartof>IEEE systems journal, 2019-06, Vol.13 (2), p.1969-1980</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c339t-9b3866dfe2272da9ea63db59de6f71d042218f13ff442c7338f74aa8116e8cac3</citedby><cites>FETCH-LOGICAL-c339t-9b3866dfe2272da9ea63db59de6f71d042218f13ff442c7338f74aa8116e8cac3</cites><orcidid>0000-0003-1199-6678 ; 0000-0002-8911-3831</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8458363$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8458363$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Sakai, Kazuya</creatorcontrib><creatorcontrib>Sun, Min-Te</creatorcontrib><creatorcontrib>Ku, Wei-Shinn</creatorcontrib><creatorcontrib>Lu, Hua</creatorcontrib><creatorcontrib>Lai, Ten H.</creatorcontrib><title>Data Verification in Integrated RFID Systems</title><title>IEEE systems journal</title><addtitle>JSYST</addtitle><description>Radio frequency identification (RFID) is widely used as a tagging system to facilitate physical transactions in the real world. Thanks to the availability of inexpensive passive RF tags, RFID technology is now the catalyst of Internet of Things, i.e., every object can be uniquely identified in an Internet-like way. In the future, many individual RFID systems are likely to be integrated into a few exascale RFID systems. In an integrated RFID system, service providers (SPs) that offer RFID-based data service and clients that use the data service are different organizations. As a consequence, quality of data in terms of authenticity is of significant concern. In this paper, we first formulate a data verification problem in RFID systems and build a model of integrated RFID systems where multiple SPs and clients exist. Then, we propose two data verification protocols to ensure data generated by SPs associated with a particular tag and has not been modified. In addition, we implement our system as a prototype. The computer simulations, analyses, and testbeds based on the prototype all demonstrate that the proposed verifiable integrated RFID system achieves a high level of security and performance.</description><subject>Automatic identification</subject><subject>Clients</subject><subject>Computer simulation</subject><subject>Data security</subject><subject>Internet of Things</subject><subject>Organizations</subject><subject>Protocol (computers)</subject><subject>Protocols</subject><subject>Radio frequency</subject><subject>Radio frequency identification</subject><subject>Radiofrequency identification</subject><subject>RFID tags</subject><subject>Servers</subject><subject>Tagging</subject><issn>1932-8184</issn><issn>1937-9234</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kEtLAzEUhYMoWKt_QDcDbp2a3LyXUq1WCoKtgquQztzIFDtTk3TRf29fuDp3cb574CPkmtEBY9Tev06_prMBUGYGYJSUmp2QHrNclxa4ON3fUBpmxDm5SGlBqTRS2x65e_TZF58Ym9BUPjddWzRtMW4zfkefsS7eR-PHYrpJGZfpkpwF_5Pw6ph98jF6mg1fysnb83j4MCkrzm0u7ZwbpeqAABpqb9ErXs-lrVEFzWoqAJgJjIcgBFSacxO08N4wptBUvuJ9cnv4u4rd7xpTdotuHdvtpAPg0oAFo7ctOLSq2KUUMbhVbJY-bhyjbmfF7a24nRV3tLKFbg5Qg4j_gBHScMX5HwiNXK0</recordid><startdate>201906</startdate><enddate>201906</enddate><creator>Sakai, Kazuya</creator><creator>Sun, Min-Te</creator><creator>Ku, Wei-Shinn</creator><creator>Lu, Hua</creator><creator>Lai, Ten H.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0003-1199-6678</orcidid><orcidid>https://orcid.org/0000-0002-8911-3831</orcidid></search><sort><creationdate>201906</creationdate><title>Data Verification in Integrated RFID Systems</title><author>Sakai, Kazuya ; Sun, Min-Te ; Ku, Wei-Shinn ; Lu, Hua ; Lai, Ten H.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c339t-9b3866dfe2272da9ea63db59de6f71d042218f13ff442c7338f74aa8116e8cac3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Automatic identification</topic><topic>Clients</topic><topic>Computer simulation</topic><topic>Data security</topic><topic>Internet of Things</topic><topic>Organizations</topic><topic>Protocol (computers)</topic><topic>Protocols</topic><topic>Radio frequency</topic><topic>Radio frequency identification</topic><topic>Radiofrequency identification</topic><topic>RFID tags</topic><topic>Servers</topic><topic>Tagging</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Sakai, Kazuya</creatorcontrib><creatorcontrib>Sun, Min-Te</creatorcontrib><creatorcontrib>Ku, Wei-Shinn</creatorcontrib><creatorcontrib>Lu, Hua</creatorcontrib><creatorcontrib>Lai, Ten H.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE systems journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Sakai, Kazuya</au><au>Sun, Min-Te</au><au>Ku, Wei-Shinn</au><au>Lu, Hua</au><au>Lai, Ten H.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Data Verification in Integrated RFID Systems</atitle><jtitle>IEEE systems journal</jtitle><stitle>JSYST</stitle><date>2019-06</date><risdate>2019</risdate><volume>13</volume><issue>2</issue><spage>1969</spage><epage>1980</epage><pages>1969-1980</pages><issn>1932-8184</issn><eissn>1937-9234</eissn><coden>ISJEB2</coden><abstract>Radio frequency identification (RFID) is widely used as a tagging system to facilitate physical transactions in the real world. Thanks to the availability of inexpensive passive RF tags, RFID technology is now the catalyst of Internet of Things, i.e., every object can be uniquely identified in an Internet-like way. In the future, many individual RFID systems are likely to be integrated into a few exascale RFID systems. In an integrated RFID system, service providers (SPs) that offer RFID-based data service and clients that use the data service are different organizations. As a consequence, quality of data in terms of authenticity is of significant concern. In this paper, we first formulate a data verification problem in RFID systems and build a model of integrated RFID systems where multiple SPs and clients exist. Then, we propose two data verification protocols to ensure data generated by SPs associated with a particular tag and has not been modified. In addition, we implement our system as a prototype. The computer simulations, analyses, and testbeds based on the prototype all demonstrate that the proposed verifiable integrated RFID system achieves a high level of security and performance.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/JSYST.2018.2865571</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0003-1199-6678</orcidid><orcidid>https://orcid.org/0000-0002-8911-3831</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1932-8184 |
ispartof | IEEE systems journal, 2019-06, Vol.13 (2), p.1969-1980 |
issn | 1932-8184 1937-9234 |
language | eng |
recordid | cdi_ieee_primary_8458363 |
source | IEEE Electronic Library (IEL) |
subjects | Automatic identification Clients Computer simulation Data security Internet of Things Organizations Protocol (computers) Protocols Radio frequency Radio frequency identification Radiofrequency identification RFID tags Servers Tagging |
title | Data Verification in Integrated RFID Systems |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T10%3A43%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Data%20Verification%20in%20Integrated%20RFID%20Systems&rft.jtitle=IEEE%20systems%20journal&rft.au=Sakai,%20Kazuya&rft.date=2019-06&rft.volume=13&rft.issue=2&rft.spage=1969&rft.epage=1980&rft.pages=1969-1980&rft.issn=1932-8184&rft.eissn=1937-9234&rft.coden=ISJEB2&rft_id=info:doi/10.1109/JSYST.2018.2865571&rft_dat=%3Cproquest_RIE%3E2235829287%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2235829287&rft_id=info:pmid/&rft_ieee_id=8458363&rfr_iscdi=true |