Skip to main content

uDisC: An Ultra-Lightweight and Distributed Scheme for Defending against Data Loss Attack in RFID Networks

  • Conference paper
  • 2210 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 316))

Abstract

RFID network is applied as a key networking architecture in Internet of Things. It can be largely deployed for object localization and tracing. As the number of RFID tags may be large or the speed of tags may be fast, the reader may misreading some tags. Thus, the data consistence is damaged in central RFID database. Currently, many solutions are proposed for this problem. However, few of them paid much efforts in computation overhead and response delay. Especially, most of them are after-event response, but not in-networking process. In this paper, we make the first attempt to solve the problem on-site. We propose several algorithms for check the missing of tags in real-time. We also propose an adaptive random checking method, called uDisC. Our solution is ultra-lightweight and with the delay bounded by a threshold value that can be manually tuned.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gonzalez, H., Han, J., Shen, X.: Cost-conscious cleaning of massive rfid data sets. In: IEEE 23rd International Conference on Data Engineering, ICDE 2007, pp. 1268–1272 (2007)

    Google Scholar 

  2. Ku, W., Chen, H., Wang, H., Sun, M.: A bayesian inference-based framework for rfid data cleansing. IEEE Transactions on Knowledge and Data Engineering (99), 1 (2012)

    Google Scholar 

  3. Massawe, L.V., Vermaak, H., Kinyua, J.D.M.: An adaptive data cleaning scheme for reducing false negative reads in rfid data streams. In: 2012 IEEE International Conference on RFID (RFID), pp. 157–164 (April 2012)

    Google Scholar 

  4. Nie, Y., Cocci, R., Cao, Z., Diao, Y., Shenoy, P.: Spire: Efficient data inference and compression over rfid streams. IEEE Transactions on Knowledge and Data Engineering 24(1), 141–155 (2012)

    Article  Google Scholar 

  5. Tran, T., Sutton, C., Cocci, R., Nie, Y., Diao, Y., Shenoy, P.: Probabilistic inference over rfid streams in mobile environments. In: IEEE 25th International Conference on Data Engineering, ICDE 2009, April 2, pp. 1096–1107 (2009)

    Google Scholar 

  6. Vahdati, F., Javidan, R., Farrahi, A.: A new method for data redundancy reduction in rfid middleware. In: 2010 5th International Symposium on Telecommunications (IST), pp. 175–180 (December 2010)

    Google Scholar 

  7. Ziekow, H., Ivantysynova, L.: A probabilistic approach for cleaning rfid data. In: IEEE 24th International Conference on Data Engineering Workshop, ICDEW 2008, pp. 106–107 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Feng, Z., Wu, X., Ma, L., Ren, W. (2012). uDisC: An Ultra-Lightweight and Distributed Scheme for Defending against Data Loss Attack in RFID Networks. In: Li, Z., Li, X., Liu, Y., Cai, Z. (eds) Computational Intelligence and Intelligent Systems. ISICA 2012. Communications in Computer and Information Science, vol 316. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34289-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34289-9_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34288-2

  • Online ISBN: 978-3-642-34289-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics