RFID Cardinality Estimation with Blocker Tags

Slides:



Advertisements
Similar presentations
Victor K. Y. Wu Department of Electrical Engineering
Advertisements

Presented by Zhu Jinshun Season: Shelving Interference and Joint Identification in Large- scale RFID Systems.
Prashant Bajpayee Advisor: Dr. Daniel Noneaker SURE 2005 Motivation Currently most radio-frequency spectrum is assigned exclusively to “primary” users.
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
Efficiently Collecting Histograms Over RFID Tags Lei Xie, Hao Han, Qun Li, Jie Wu, and Sanglu Lu State Key Laboratory for Novel Software Technology, Nanjing.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
MAC3: Medium Access Coding & Congestion Control Devavrat Shah (MIT) Damon Wischik (UCL)
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies.
Serverless Search and Authentication Protocols for RFID Chiu C. Tan, Bo Sheng and Qun Li Department of Computer Science College of William and Mary.
Every Bit Counts – Fast and Scalable RFID Estimation Muhammad Shahzad and Alex X. Liu Dept. of Computer Science and Engineering Michigan State University.
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments Yitao Duan and John Canny UC Berkeley.
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
Adaptive Splitting Protocols for RFID Tag Collision Arbitration Jihoon Myung and Wonjun Lee ACM Mobihoc 06.
A Layered Hybrid ARQ Scheme for Scalable Video Multicast over Wireless Networks Zhengye Liu, Joint work with Zhenyu Wu.
RFID Security and Privacy Part 2: security example.
On The Cryptographic Applications of Random Functions Oded Goldreich Shafi Goldwasser Silvio Micali Advances in Cryptology-CRYPTO ‘ 84 報告人 : 陳昱升.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
Asmt. 10: ID chips in product Pro RFID chips in product Group 3. Team A Ivan Augustino Andres Crucitti.
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
RFID Technology in Healthcare Presenters: Lauren Gunn and Connor Zale.
“SDJS: Efficient Statistics in Wireless Networks” Albert Krohn, Michael Beigl, Sabin Wendhack TecO (Telecooperation Office) Institut für Telematik Universität.
Radio Frequency Identification Inventory Tracking and Status Monitoring of Blood Units Team 10 Mark Green Melissa Kronenberger Nadine Tribur Aaron Schlanser.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies Presented by : Joseph Gunawan.
1 Cardinality Estimation for Large-scale RFID Systems Chen Qian, Hoilun Ngan, and Yunhao Liu Hong Kong University of Science and Technology.
RFID in the Military Rana, Mohammed,Trandel, Ahmed.
INTERNET OF THINGS SUBBAIYA VASU UDAYARAJAN UOTTAWA CSI 5169 WIRELESS NETWORKS AND MOBILE COMPUTING SUBMITTED TO: PROFESSOR STOJMENOVIC.
Panagiotis Rizomiliotis and Stefanos Gritzalis Dept. of Information and Communication Systems Engineering University of the Aegean, Greece GHB#: A Provably.
RFID Security without Extensive Cryptography Sindhu Karthikeyan Mikhail Nesterenko Kent State University SASN November 07, 2005.
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
A Novel Cache Architecture with Enhanced Performance and Security Zhenghong Wang and Ruby B. Lee.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
Stochastic sleep scheduling (SSS) for large scale wireless sensor networks Yaxiong Zhao Jie Wu Computer and Information Sciences Temple University.
A SURVEY OF APPLICATIONS AND REQUIREMENTS OF UNIQUE IDENTIFICATION SYSTEMS AND RFID TECHNIQUES R 蘇昱彰 1.
A Hybrid Method for achieving High Accuracy and Efficiency in Object Tracking using Passive RFID Lei Yang 1, Jiannong Cao 1, Weiping Zhu 1, and Shaojie.
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
Probabilistic Optimal Tree Hopping for RFID Identification Muhammad Shahzad Alex X. Liu Dept. of Computer Science and Engineering Michigan State University.
 Leaf test codes are secure sine they would not be jammed by jammers.  When few normal users are present, many leaf code tests are wasted since absent.
Disclosure risk when responding to queries with deterministic guarantees Krish Muralidhar University of Kentucky Rathindra Sarathy Oklahoma State University.
Yafeng Yin 1, Lei Xie 1, Jie Wu 2, Athanasios V. Vasilakos 3, Sanglu Lu 1 1 State Key Laboratory for Novel Software Technology, Nanjing University, China.
Improving the Efficiency of Fault-Tolerant Distributed Shared-Memory Algorithms Eli Sadovnik and Steven Homberg Second Annual MIT PRIMES Conference, May.
Advanced Communication Network Joint Throughput Optimization for Wireless Mesh Networks R 戴智斌 R 蔡永斌 Xiang-Yang.
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
RFID E STIMATION P ROBLEM Lee, Gunhee S URVEY. R EFERENCES Energy Efficient Algorithms for the RFID Estimation Problem –Tao Li, Samuel Wu, Shigang Chen.
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
Windows XP & Vista Memory Management
Fairness Matters: Identification of Active RFID Tags with Statistically Guaranteed Fairness Michigan State University Muhammad Shahzad Alex X. Liu North.
Muhammad Shahzad Alex X. Liu Dept. of Computer Science and Engineering
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Computer Science Department of University of Virginia  Voltage on a tag Radio Frequency Identification Systems New Ideas and Algorithms Introduction to.
Presented By Amarjit Datta
Every Bit Counts – Fast and Scalable RFID Estimation
Resource Allocation in Hospital Networks Based on Green Cognitive Radios 王冉茵
Identifying the Missing Tags in a Large RFID System Tao Li (University of Florida, US) Shigang Chen (University of Florida, US) Yibei Ling (Telcordia Technologies,
A Bit-Map-Assisted Energy- Efficient MAC Scheme for Wireless Sensor Networks Jing Li and Georgios Y. Lazarou Department of Electrical and Computer Engineering,
Distributed Learning for Multi-Channel Selection in Wireless Network Monitoring — Yuan Xue, Pan Zhou, Tao Jiang, Shiwen Mao and Xiaolei Huang.
RFID(Radio Frequency Identification) Vs Barcode Software.
A Stochastic Frame Based Approach to RFID Tag Searching Ann L. Wang Dept. of Computer Science and Engineering Michigan State University Joint work with.
Sensing multiple passive tags simultaneously
Combating Tag Cloning with COTS RFID Devices
Randomized PRF Tree Walking Algorithm for Secure RFID
An Improved Novel Key Management Protocol for RFID Systems
N-ID Definition Proposal
Selective Blocking of RFID Tags for Consumer Privacy
Operating Systems: Internals and Design Principles, 6/E
IOT Technologies: Radio Frequency Identification (RFID)
Lecture 4: File-System Interface
Presentation transcript:

RFID Cardinality Estimation with Blocker Tags Xiulong Liu, Bin Xiao, Keqiu Li, Jie Wu, Alex X. Liu, Heng Qi and Xin Xie Presenter: Dr. Bin Xiao The Hong Kong Polytechnic University, Hong Kong csbxiao@comp.polyu.edu.hkt

Outline 1 Background & Motivation 2 Problem Formulation 3 RFID Estimation scheme with Blocker tags (REB) 4 Theoretical Analysis 5 Performance Evaluation 6 Conclusion

Background & Motivation Radio Frequency Identification. An identification system that consists of chip-based tags, readers, and a back-end. Each tag has a unique 96-bit ID to identify the tagged object. RFID tags Server Reader

RFID Background Two types of RFID tags: Passive tags and Active tags

RFID Background Advantages of RFID over bar-code: RFID Bar-code vs. Bar-code Advantages of RFID over bar-code: remote access non-line-of-sight reading multiple simultaneous accesses large rewritable memory Compared with the conventional barcode system, RFID technology has many attractive properties. For example, the RFID tag can be read in a longer distance; even if there is something between the reader and RFID tags, the dada can still be retrieved; However, bar-code does not work under this situation; Multiple RFID tags can be read simultaneously. However, bar-code can only be scanned one by one. The chip of RFID tag can store more information than bar-code. Wireless

Background & Motivation Supply Chain Management Anti-Counterfeit Pets Management Environment Monitoring Object Tracking

Background & Motivation The widely-used RFID tags impose serious privacy concerns. Reason: When C1G2 tags are interrogated by an RFID reader, no matter whether the reader is authorized or not, they blindly respond with their IDs and other stored information (such as manufacturer, product type, and price) in a broadcast fashion.

Background & Motivation What woman wants her dress size to be publicly readable by any nearby scanner? Who wants the medications and other contents of a purse to be scannable? Who wants his or her location to be tracked and recorded based on the unique ID number in their shoes or other clothing? An effective solution to this privacy issue is to use commercially available blocker tags.

Background & Motivation What are blocker tags? A blocker tag is an RFID device that is preconfigured with a set of known RFID tag IDs, which we call blocking IDs. The blocker tag behaves as if all tags with its blocking IDs are present.

Background & Motivation How blocker tags protect the privacy? A blocker tag protects the privacy of the set of genuine tags whose IDs are among the blocking IDs of the blocker tag because any response from a genuine tag is coupled with the simultaneous response from the blocker tag; thus, the two responses always collide and attackers cannot obtain private information. The genuine tag always collides with the blocking tag having the same ID

Problem Formulation We are concerned with the problem of RFID (population size) estimation with the presence of blocker tags. Problem Definition: given (1) a set of unknown genuine tags 𝐺 of unknown size 𝑔, (2) a blocker tag with a set of known blocking IDs 𝐵, (3) a required confidence interval 𝛼∈ 0.1 , and a required reliability 𝛽∈[0,1), we want to use one or more readers to estimate the number of genuine tags in 𝐺, denoted as 𝑔 , so that 𝑃{| 𝑔 −𝑔|≤𝑔𝛼}≥𝛽

Problem Formulation To the best of our knowledge, this paper is the first to investigate RFID estimation with the presence of a blocker tag. None of the existing estimation schemes considers the presence of a blocker tag. Furthermore, none of them can be easily adapted to solve this problem.

Problem Formulation How about turning off the blocker tag and then using prior RFID estimation schemes to estimate the number of genuine tags? Turning off the blocker tag will give attackers a time window to breach privacy, especially for the scenarios in which RFID estimation schemes are being continuously performed for monitoring purposes.

REB Protocol RFID Estimation scheme with Blocker tags The communication protocol used by REB is the standard framed slotted Aloha protocol.

REB Protocol Detailed Steps: Step1: the reader broadcasts a value 𝑓 and a random number 𝑅 to query all tags (including blocker tags), where 𝑓 is the number of slots in the forthcoming frame. Then, each tag computes a hash 𝐻 𝐼𝐷,𝑅 %𝑓 to select a slot to respond.

REB Protocol Detailed Steps: Step1: the reader broadcasts a value 𝑓 and a random number 𝑅 to query all tags (including blocker tags), where 𝑓 is the number of slots in the forthcoming frame. Then, each tag computes a hash 𝐻 𝐼𝐷,𝑅 %𝑓 to select a slot to respond. 0 represents no tag responds 1 represents only one tag responds 2+ represents two or more tags simultaneously respond and create a collision 1 2+    

REB Protocol Step2: As we know the blocking IDs, we can virtually execute the framed slotted Aloha protocol using the same frame size 𝑓 and random number 𝑅 for the blocking IDs; thus, we get another vector.

REB Protocol Step2: As we know the blocking IDs, we can virtually execute the framed slotted Aloha protocol using the same frame size 𝑓 and random number 𝑅 for the blocking IDs; thus, we get another vector. 1 2+   0 represents no tag chooses this slot. 1 represents only one tag chooses this slot. 2+ represents two or more tags choose this common slot.  

REB Protocol Step3: we count two numbers: 𝑁 00 , which is the number of slot 𝑖 such that both 𝑉 1 𝑖 =0 and 𝑉 2 𝑖 =0, and 𝑁 11 , which is the number of slots 𝑖 such that both 𝑉 1 𝑖 =1 and 𝑉 2 𝑖 =1. 1 2+   The Key Insight: The smaller 𝑁 00 is, the larger |𝐵∪𝐺| is. The larger 𝑁 11 is the larger |𝐵−𝐺| is.

REB Protocol We theoretically proved that 𝑁 00 monotonously decreases with the increase of |𝐵∪𝐺|; and 𝑁 11 monotonously increases with the increase of |𝐵−𝐺|. Therefore, from the observed values of 𝑁 00 and 𝑁 11 , we can estimate 𝐵∪𝐺 and |𝐵−𝐺|, respectively. Then, we can calculate the number of genuine tags, i.e., 𝐺 = 𝐵∪G −|𝐵−𝐺|.

REB Protocol Practical Issue: The frame size should be set as no more than 512. To scale to a large tag population, the reader uses a persistence probability 𝑝∈(0, 1] to virtually extend the frame size 𝑓 to 𝑓/𝑝, but actually terminates the frame after the first 𝑓 slots. Fundamentally, each tag participates in the actual frame of 𝑓 slots with a probability 𝑝.

Theoretical Analysis Functional Estimator: 𝑔 =− 𝑓 𝑝 𝑙𝑛 𝑁 00 𝑓 − 𝑓 𝑁 11 𝑝 𝑁 00 , where 𝑓 is the observed frame size, 𝑝 is the persistence probability, 𝑁 00 is the number of persistent empty slots, 𝑁 11 is the number of persistent singleton slots.

Theoretical Analysis Variance of the Estimator: 𝑉𝑎𝑟 𝑔 = 1 𝑓 𝑝 2 𝑒 𝑢𝑝 𝑓 𝑏 ′2 𝑝 2 + 𝑓 2 − 𝑏 ′ 𝑓𝑝 − 𝑓 𝑝 2 , where 𝑓 is the observed frame size, 𝑝 is the persistence probability, 𝑢=|𝐵∪𝐺|, and 𝑏 ′ =|𝐵−𝐺|.

Theoretical Analysis Refined Estimation with 𝒌 Frames: We repeat 𝑘 independent frames with different seeds, and use the average estimation result 𝑔 𝑘 ′ = 1 𝑘 𝑗∈[1,𝑘] 𝑔 𝑗 to refine the estimation of REB, where 𝑔 𝑗 is the estimate derived from the 𝑗-th frame.

Theoretical Analysis Termination Condition: If the frame number k satisfies: 𝑘≥ 𝑍 𝛽 𝑔𝛼 𝑗∈[1,𝑘] [ 1 𝑓 𝑗 𝑝 𝑗 2 𝑒 𝑢 𝑝 𝑗 𝑓 𝑗 𝑏 ′2 𝑝 𝑗 2 + 𝑓 𝑗 2 − 𝑏 ′ 𝑓 𝑗 𝑝 𝑗 − 𝑓 𝑗 𝑝 𝑗 2 ] , where 𝑓 𝑗 and 𝑝 𝑗 are the frame size and persistence probability used in the 𝑗-th frame.

Theoretical Analysis Avoiding Premature Termination: 𝑘≥ 𝑍 𝛽 𝑔𝛼 𝑗∈[1,𝑘] [ 1 𝑓 𝑗 𝑝 𝑗 2 𝑒 𝑢 𝑝 𝑗 𝑓 𝑗 𝑏 ′2 𝑝 𝑗 2 + 𝑓 𝑗 2 − 𝑏 ′ 𝑓 𝑗 𝑝 𝑗 − 𝑓 𝑗 𝑝 𝑗 2 ] , If we directly use the estimated values 𝑏 ′ , 𝑢 , 𝑔 to calculate the R.H.S. of this inequality, 𝑘 may have a chance to be larger than it, which is not true and REB will have a premature termination.

Theoretical Analysis 𝛿-sigma method to avoid premature termination. When calculating the R.H.S. of the termination inequality, we use the upper/lower bounds on 𝑏 ′ , 𝑢, 𝑔. Upper bounds: 𝑥 ↑= 𝑥 +𝛿 𝑉𝑎𝑟( 𝑥 ) ; Lower bounds: 𝑥 ↓= 𝑥 −𝛿 𝑉𝑎𝑟( 𝑥 ) , Here, 𝑥 could be 𝑏 ′ ,𝑢, or 𝑔. Three-sigma rule indicates 𝛿=3 is large enough.

Theoretical Analysis Optimization: frame size 𝑓 and persistence probability 𝑝. For the first frame, we simply set 𝑓=512 and 𝑝= 512 𝒖 , where 𝒖 is the number of total tags that can be fast estimated by the existing estimation protocols, e.g., ART [Mobicom 12]. For the other frames, we can leverage the information obtained from previous frames to optimize 𝑓 and 𝑝.

Theoretical Analysis Optimization: the Persistence Probability 𝑝 For a fixed frame size 𝑓, the goal of optimizing 𝑝 is to minimize the estimation variance 𝑉𝑎𝑟( 𝑔 ). The first-order derivation The optimal 𝒑 makes 𝝏𝑽𝒂𝒓( 𝒈 ) 𝝏𝒑 =𝟎 𝑽𝒂𝒓( 𝒈 ) is a convex function of 𝒑 Binary search algorithm

The remaining execution time Theoretical Analysis Optimization: the frame size 𝒇 We target finding an optimal 𝑓 to minimize the expected remaining execution time. Minimize 𝑓+1 ×𝑦 s.t. 𝑥+𝑦≥ 𝑍 𝛽 𝑔𝛼 𝑗∈ 1,𝑥 𝑉𝑎𝑟( 𝑔 𝑗 )+𝑦𝑉𝑎𝑟( 𝑔 ) 𝑓∈{2,4,8,16,…,512} Here, 𝑥 is the number of frames that have already been executed. 𝑦 is the number of frames that need to be further executed. The remaining execution time

Performance Evaluation 1. Verifying the Optimized 𝑓 and 𝑝. The values of 𝑓 and 𝑝 approach their overall optimal values after a few frames.

Performance Evaluation 2. Estimation Reliability. Varying System Scale Varying Ratio of Tags Our REB (𝛿=1) can meet the required accuracy under different simulation settings

Performance Evaluation 3. Time Efficiency: Impact of |𝑈| The ratio of three types of IDs is fixed to 1:1:1. The total tag number |𝑈| varies. When |𝑈|=50000, our REB runs 33x faster than the fastest tag identification protocol.

Performance Evaluation 4. Time Efficiency: Impact of Tag Ratio Varying the ratio of |𝑩−𝑮| Varying the ratio of |𝑩∩𝑮| Varying the ratio of |𝑮−𝑩| Our REB persistently runs tens of times faster than the existing protocols.

Conclusion We take the first step to address the problem of RFID estimation with Blocker tags. The proposed REB protocol is compliant with the commodity EPC C1G2 standard, and does not require any modifications to off the-shelf RFID tags. REB can guarantee any degree of estimation accuracy specified by the users. Extensive simulation results reveal that REB is tens of times faster than the fastest identification protocol with the same accuracy requirement.

Thanks for your attention! Q & A