RFID Technologies for Internet of Things (Record no. 56887)

000 -LEADER
fixed length control field 03672nam a22005055i 4500
001 - CONTROL NUMBER
control field 978-3-319-47355-0
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421112045.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 161102s2016 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783319473550
-- 978-3-319-47355-0
082 04 - CLASSIFICATION NUMBER
Call Number 005.7
100 1# - AUTHOR NAME
Author Chen, Min.
245 10 - TITLE STATEMENT
Title RFID Technologies for Internet of Things
300 ## - PHYSICAL DESCRIPTION
Number of Pages VII, 95 p. 37 illus.
490 1# - SERIES STATEMENT
Series statement Wireless Networks,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Efficient Tag Search in Large RFID Systems -- Lightweight Anonymous RFID Authentication -- Identifying State-Free Networked Tags.
520 ## - SUMMARY, ETC.
Summary, etc This book introduces applications of RFID on the Internet of things, under the emerging technologies for tag search, anonymous RFID authentication, and identification of networked tags. A new technique called filtering vector (a compact data structure that encodes tag IDs) is proposed to enable tag filtration, meeting the stringent delay requirements for real-world applications. Based on filtering vectors, a novel iterative tag search protocol is designed, which progressively improves the accuracy of search result and reduces the time of each iteration by using the information learned from the previous iterations. Moreover, the protocol is extended to work under noisy channel. The authors also make a fundamental shift from the traditional design paradigm for anonymous RFID authentication by following an asymmetry design principle that pushes most complexity to the readers while leaving the tags as simple as possible. A novel technique is developed to dynamically generate random tokens on demand for authentication. The token-based authentication protocol only requires O(1) communication overhead and online computation overhead per authentication for both readers and tags. Finally, the authors investigate the problem of networked-tag identification. The traditional contention-based protocol design will incur too much energy overhead in multihop tag systems, and a reader-coordinated design that significantly serializes tag transmissions performs much better. In addition, a solution based on serial numbers is proposed to achieve load balancing, thereby reducing the worst-case energy cost among the tags. Designed for researchers and professionals, this SpringerBrief will interest individuals who work in efficiency, security, and privacy. Advanced-level students focused on network design will also benefit from the content.
700 1# - AUTHOR 2
Author 2 Chen, Shigang.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-319-47355-0
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2016.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer communication systems.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electrical engineering.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Information Systems Applications (incl. Internet).
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Communications Engineering, Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Communication Networks.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2366-1186
912 ## -
-- ZDB-2-SCS

No items available.