Cloud-Based Iterative RFID Tag Search Protocol Using Bloom Filters

  • Yuming Qian
  • Daqiang ZhangEmail author
  • Shengjie Zhao
  • Xiaopeng Fan
  • Ke Fan
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 142)


RFID (Radio Frequency Identification) has achieved widespread success in supply chain management, object identification, and assets tracking. In these applications, we often need to search for a particular set of products in a large-scale collection of products. Existing schemes have been proposed, but they are limited by a couple of problems. Firstly, they fail to work under the situation when the cardinality of X is much larger than that of Y. Secondly, they implicitly assume the RFID readers are adequate powerful so that readers can handles a large number of query requests in a short time. To this end, we propose ITSP – Cloud-based Iterative Tag Search Protocol, which can locate the tags in a secure and efficient manner. To be secure, ITSP authenticates the communications between RFID readers and tags to in advance. To be efficient, ITSP reformats the single-round communication model to a multi-round communication one between readers and tags. Furthermore, ITSP employs a cloud-based service to rapidly conduct the searching process. Extensive experimental results show that the proposed scheme achieves high-levels of searching efficiency with the improvement at least 19 %.


RFID Cloud computing Tag query Iterative searching 



Dr. Zhang and Dr. Zhao are the corresponding author. This work was supported in part by the National Natural Science Foundation of China under Grant 61103185 and 61472283, the Fok YingTong Education Foundation of China under Grant 142006, the Research Funds for the Central Universities under Grant 2100219043, and the National Basic Research Program of China (973 Program) under Grant 2014CB340404.


  1. 1.
    Zhang, D., Zhou, J., Guo, M., Cao, J., Li, T.: TASA: tag-free activity sensing using RFID tag arrays. IEEE Trans. Parallel Distrib. Syst. 22(4), 558–570 (2011)CrossRefGoogle Scholar
  2. 2.
    Tan, C.C., Sheng, B., Li, Q.: Efficient techniques for monitoring missing RFID tags. IEEE Trans. Wirel. Commun. 9(6), 1882–1889 (2010)CrossRefGoogle Scholar
  3. 3.
    Chen, S., Zhang, M., Xiao, B.: Efficient information collection protocols for sensor-augmented RFID networks. In: INFOCOM 2011, pp. 3101–3109 (2011)Google Scholar
  4. 4.
    Lee, C.-H., Chung, C.-W.: Efficient storage scheme and query processing for supply chain management using RFID. In: SIGMOD Conference, pp. 291–302 (2008)Google Scholar
  5. 5.
    Qiao, Y., Chen, S., Li, T., Chen, S.: Energy-efficient polling protocols in RFID systems. In: MobiHoc 2011, p. 25 (2011)Google Scholar
  6. 6.
    Ni, L.M., Liu, Y., Lau, Y.C., Patil, A.P.: LANDMARC: indoor location sensing using active RFID. Wirel. Netw. 10, 701–710 (2004)CrossRefGoogle Scholar
  7. 7.
    Chang, J.-C., Wu, H.-L., Zhang, D.: On constant-time-identification and privacy-preserving RFID protocols: trade-off between time and memory. In: UIC/ATC 2013, pp. 613–618 (2013)Google Scholar
  8. 8.
    Li, Y., Ding, X.: Protecting RFID communications in supply chains. In: ASIACCS 2007, pp. 234–241 (2007)Google Scholar
  9. 9.
    Waldrop, J., Engels, D.W., Sarma, S.E.: Colorwave: an anticollision algorithm for the reader collision problem. In: ICC 2003, pp. 1206–1210 (2003)Google Scholar
  10. 10.
    Zhou, Z., Gupta, H., Das, S.R., Zhu, X.: Slotted scheduled tag access in multi-reader RFID systems. In: ICNP 2007, pp. 61–70 (2007)Google Scholar
  11. 11.
    Tang, S., Yuan, J., Li, X.-Y., Chen, G.: RASPberry: a stable reader activation scheduling protocol in multi-reader RFID systems. In: ICNP 2009, pp. 304–313 (2009)Google Scholar
  12. 12.
    Yoon, W., Vaidya, N.H.: RFID reader collision problem: performance analysis and medium access. Wirel. Commun. Mob. Comput. 12(5), 420–430 (2012)CrossRefGoogle Scholar
  13. 13.
    Zheng, Y., Li, M.: Fast tag searching protocol for large-scale RFID systems. IEEE/ACM Trans. Netw. 21(3), 924–934 (2014)CrossRefGoogle Scholar
  14. 14.
    Chen, M., Luo, W., Mo, Z., Fang, Y.: An efficient tag search protocol in large-scale RFID systems. In: IEEE INFOCOM, 2014, pp. 899–907 (2014)Google Scholar
  15. 15.
    Chun, J.Y., Hwang, J.Y., Lee, D.H.: Privacy-enhanced RFID Tag Search System (Chapter 9). In: Preradovic, S. (ed.) Advanced Radio Frequency Identification Design and Applications. InTech, Rijeka (2011). ISBN 978-953-307-168-8Google Scholar
  16. 16.
    Cha, J.-R., Kim, J.-H.: Dynamic framed slotted ALOHA algorithms using fast tag estimation method for RFID system. In: IEEE CCNC, 2006, pp. 768–772 (2006)Google Scholar
  17. 17.
    Chen, M., Gonzalez, S., Leung, V., et al.: A 2G-RFID-based e-healthcare system. IEEE Wireless Commun.17(1), 37–43 (2010)CrossRefGoogle Scholar

Copyright information

© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015

Authors and Affiliations

  • Yuming Qian
    • 1
  • Daqiang Zhang
    • 1
    Email author
  • Shengjie Zhao
    • 2
  • Xiaopeng Fan
    • 3
  • Ke Fan
    • 1
  1. 1.School of Software EngineeringTongji UniversityShanghaiChina
  2. 2.The Key Lab of Embedded System and Service Computing, Ministry of EducationTongji UniversityShanghaiChina
  3. 3.Shenzhen Institute of Advanced TechnologyCASShenzhenChina

Personalised recommendations