Mobility

Who Counterfeited My Viagra? Probabilistic Item Removal Detection Via RFID Tag Cooperation

Free registration required

Executive Summary

The authors leverage RFID tag cooperation to enforce tampering detection. That is, they provide a set of probabilistic protocols that detect the absence of a tag from a system composed of a set of tags and a reader. Their proposals are able to detect which tag and for how long it has been taken away from the system. The grain of the detection can be tuned with respect to the resources available on the tags. Another merit of their solutions is to provide a proof-of-concept that a small level of cooperation among tags can further extend the range of applications RFID can support, possibly opening new veins of research.

  • Format: PDF
  • Size: 1480.9 KB