RFID Cardinality Estimation with Blocker Tags
|
|
- Ruth Lamb
- 7 years ago
- Views:
Transcription
1 RFID Cardinality Estimation with Blocker Tags Xiulong Liu, Bin Xiao, Keqiu Li, Jie Wu, Alex X. Liu, Heng Qi and Xin Xie School o Computer Science and Technology, Dalian University o Technology, China Department o Computing, The Hong Kong Polytechnic University, Hong Kong Department o Computer and Inormation Sciences, Temple University, USA Department o Computer Science and Engineering, Michigan State University, USA National Key Laboratory or Novel Sotware Technology, Nanjing University, China {xiulongliudut, likeqiu, qhclement, xiexin}@gmail.com csbxiao@comp.polyu.edu.hk, jiewu@temple.edu, alexliu@nju.edu.cn Abstract The widely used RFID tags impose serious privacy concerns as a tag responds to queries rom readers no matter they are authorized or not. The common solution is to use a commercially available blocker tag which behaves as i a set o tags with known blocking IDs are present. The use o blocker tags makes RFID estimation much more challenging as some genuine tag IDs are covered by the blocker tag and some are not. In this paper, we propose REB, the irst RFID estimation scheme with the presence o blocker tags. REB uses the ramed slotted Aloha protocol speciied in the CG standard. For each round o the Aloha protocol, REB irst executes the protocol on the genuine tags and the blocker tag, and then virtually executes the protocol on the known blocking IDs using the same Aloha protocol parameters. The basic idea o REB is to conduct statistically inerence rom the two sets o responses and estimate the number o genuine tags. We conduct extensive simulations to evaluate the perormance o REB, in terms o time-eiciency and estimation reliability. The experimental results reveal that our REB scheme runs tens o times aster than the astest identiication protocol with the same accuracy requirement. Keywords RFID Estimation, RFID Privacy, Blocker Tags. I. INTRODUCTION RFID systems have been widely used in a variety o applications such as supply chain management and inventory control [] [7] as the cost o commercial passive RFID tags is negligible compared with the value o the products to which they are attached (e.g., as low as 5 cents per tag [8]). For example, in Hong Kong International Airport where RFID systems are used to track shipment, the average daily cargo tonnage in May was K tonnes and has been on the rise [9]. An RFID system typically consists o a reader and a population o tags []. A reader has a dedicated power source with signiicant computing capability. It transmits commands to query a set o tags and the tags respond over a shared wireless medium. A tag is a microchip with an antenna in a compact package that has limited computing capability and longer communication range than barcodes. There are two types o tags: () passive tags, which do not have their own power sources and are powered up by harvesting the radio requency energy rom readers; () active tags, which have their own power sources. The widely used RFID tags impose serious privacy concerns as when a tag is interrogated by an RFID reader, no matter the reader is authorized or not, it blindly responds with its ID and other stored inormation (such as manuacturer, product type, and price) in a broadcast ashion. For example, a woman may not want her dress sizes and a patient may not want his/her medication, to be publicly known. An eective solution to this privacy issue is to use commercially available blocker tags [], []. A blocker tag is an RFID device that is preconigured with a set o known RFID tag IDs, which we call blocking IDs. The blocker tag behaves as i all tags with its blocking IDs are present. A blocker tag protects the privacy o the set o genuine tags whose IDs are among the blocking IDs o the blocker tag because any response rom a genuine tag is coupled with the simultaneous response rom the blocker tag; thus, the two responses collide and attackers cannot obtain private inormation. This paper concerns with the problem o RFID (population size) estimation with the presence o a blocker tag. Formally, the problem is deined as ollows: given () a set o unknown genuine tags G o unknown size g, () a blocker tag with a set o known blocking IDs B, (3) a required conidence interval α (, ], and () a required reliability β [, ), we want to use one or more readers to compute the estimated the number o genuine tags in G, denoted as ˆg, so that P { ˆg g αg} β. In other words, we have a set G o genuine tags with unknown number o unknown IDs and a set B o tags with known number o known IDs, we want to estimate G with the presence o B. The two sets G and B may overlap, as shown in Fig.. This problem may arise in many applications. For example, a jewel store may want to use such an RFID estimation scheme to monitor its stock while a blocker tag is being used to protect the privacy o some precious items. Fig.. Each ID corresponds to a blocking tag Each ID corresponds to a blocking tag and a genuine tag Each ID corresponds to a genuine tag Genuine Tag IDs (unknown) Blocking IDs (known) Three types o IDs in the system containing blocker tags. To the best o our knowledge, this paper is the irst to investigate RFID estimation with the presence o a blocker tag. Although some RFID estimation schemes have been proposed [7], [], [3] [8], none o them considers the
2 presence o a blocker tag. Furthermore, none o them can be easily adapted to solve our problem. How about turning o the blocker tag and then using prior RFID estimation schemes to estimate the number o genuine tags? Turning o the blocker tag will give attackers a time window to breach privacy, especially or the scenarios that RFID estimation schemes are being continuously perormed or monitoring purpose. Existing tree walking based [9] and ramed slotted Aloha based [] RFID identiication schemes can be used to exactly identiy the genuine tags, and thus obtaining the genuine tag cardinality. However, they are too slow or our estimation purpose. In this paper, we propose an RFID Estimation scheme with Blocker tags (REB). The communication protocol used by REB is the standard ramed slotted Aloha protocol, in which a reader irst broadcasts a value and a random number R to the tags where represents the number o time slots in a orthcoming rame. Then, each tag computes a hash using the random number R and its ID, where the resulting hash value h is within [, ], and the tag replies during slot h. For each slot, i no tag replies, we represent it as ; i only one tag replies, we represent it as ; i more than one tag replies, the tag responses will collide, and we represent this slot as c. Note that a reader can detect i there is a collision according to the CG standard. Executing this protocol or the blocking IDs (simulated by the blocker tag) and genuine tags, we get a ternary array BG[.. ] where each bit is,, or c. As we know the blocking IDs, we can virtually execute the ramed slotted Aloha protocol using the same rame size and random number R or the blocking IDs; thus, we get a ternary array B[.. ] where each bit is,, or c. From the two arrays BG[.. ] and B[.. ], we calculate two numbers: N, which is the number o slots i such that both BG[i] = and B[i] =, and N, which is the number o slots i such that both BG[i] = and B[i] =. REB is based on the key insight that in general the smaller N is, the larger B G is and the larger N is, the larger B G is. In this paper, we show that N monotonously decreases with the increase o B G and N monotonously increases with the increase o B G. Thus, rom the observed N and N, we can estimate B G and B G. Then, we can calculate the size o G because G = B G B G. We make the ollowing three key contributions in this paper. First, we make the irst eort towards RFID estimation with the presence o a blocker tag. We propose the REB scheme jointly using N and N to achieve an unbiased estimator or the genuine tag cardinality. The key technical development o this paper is on quantitatively and statistically correlating N and B G, N and B G. Second, we conduct thorough analysis to optimize system parameters, thereby achieving the required conidence interval and reliability in the astest speed. Third, we implement REB in Matlab and evaluate its perormance through extensive simulations. The experimental results reveal that our REB scheme runs tens o times aster than the astest identiication protocol under the same accuracy requirement. The rest o this paper is organized as ollows. In Section II, we describe REB and our theoretical analysis. In Section III, we conduct extensive simulations to evaluate the perormance o REB. We discuss related work in Section IV. Finally, we conclude the paper in Section V. II. REB PROTOCOL In this section, we irst describe the system model used in this paper. Then, an eicient RFID Estimation scheme with Blocker tags (REB) is proposed to estimate the number o genuine tags by jointly using N and N observed in a time rame. We explicitly give the unctional estimator and point out that the estimation using a single time rame is hard to be accurate due to probabilistic variance. Hence, we propose to use multiple independent time rames to reine the estimation. This section urther presents rigorous theoretical analysis to investigate how many rames are needed to guarantee the desired estimation accuracy and how to avoid premature protocol termination. We also investigate the parameter settings (i.e., and p) to optimize the perormance o our REB. A. System Model For the clarity o presentation, we irst consider the RFID system containing a single reader, a single blocker tag, and a population o genuine tags. Then, we will discuss how to extend REB to the scenario that deploys multiple readers and blocker tags. We represent the set o blocking IDs as B, whose cardinality is b. The set o genuine tags is denoted as G, whose cardinality is g. We use U to denote the union tag set, i.e., B G, and U = u. The IDs in B G do not correspond to any genuine tags, whose cardinality is denoted as b, i.e., b = B G. The reader communicates with tags (including both genuine tags and virtual ones simulated by the blocker tag) under control o the backend server. The communication between the reader and tags are based on a time slotted way. Any two consecutive transmissions (rom a tag to a reader or vice versa) are separated by a waiting time τ w = 3us []. According to the speciication o the Philips I-Code system [], the wireless transmission rate rom a tag to a reader is 53Kb/s, that is, it takes a tag τ t = 8.9us to transmit bit. The rate rom a reader to a tag is 6.5Kb/s, that is, transmission o bit to tags requires τ r = 37.7us. Then, the time o a slot or transmitting m-bit inormation rom a tag to the reader is τ w + m τ t ; and the time o a slot or transmitting m-bit inormation rom a reader to the tags is τ w + m τ r. The notations used throughout the paper are summarized in Table I. B. Protocol Description Our REB uses the standard ramed slotted Aloha protocol speciied in EPC CG [] as the MAC layer communication mechanism. The reader initializes a slotted time rame by broadcasting a binary request R,, where R is a random number and is the rame size (i.e., the number o slots in the orthcoming rame). Using the received parameters R,, each tag initializes its slot counter sc by calculating sc = H(ID, R) mod and the hashing result ollows a uniorm distribution within [, ]. The reader broadcasts QueryRep command at the end o each slot. Upon receiving QueryRep, a tag decrements its slot counter sc
3 TABLE I. NOTATIONS USED IN THE PAPER Notations Descriptions G set o genuine tags. g cardinality o G. i.e., g = G. B set o blocking IDs. b cardinality o B G. i.e., b = B G. U union set. U = B G. u cardinality o U. i.e., u = B G. α required conidence interval. β required reliability. ˆg estimate o g. rame size. p persistence probability. E( ) expectation. V ar( ) variance. Z β the percentile o β. e.g., Z β =.96 when β = 95%. p probability that a slot pair is,. p probability that a slot pair is,. N # o the persistent empty slots in a rame. N # o the persistent singleton slots in a rame. by. In a slot, a tag will respond to the reader i its slot counter sc becomes. According to the occupation status, slots are classiied into three types: empty slot in which no tag responds; singleton slot in which only one tag responds; collision slot in which two or more tags respond. In the ollowing, we present how our REB estimates the number o genuine tags by observing the slots in a rame. Since the backend server gets ull knowledge o the simulated blocking IDs, it is able to predict which slots the blocking IDs are mapped to. Thus, it is able to construct a virtual ternary array B[.. ]. A bit in B[.. ] is set to when no blocking ID is mapped to this slot; when only one blocking ID is mapped to this slot; c when two or more blocking IDs are mapped to this slot (a hashing collision). On the other hand, by observing the rame, the reader could get another array BG[.. ], also consisting o bits. A bit in BG[.. ] is set to when no tag responds in this slot; when only one tag responds in this slot; c when two or more tags cause a collision in this slot. To distinguish a singleton slot rom a collision one, each tag does not need to respond with the whole 96-bit ID. For saving time, each tag responds with the RN6 (6-bit) [] that is much shorter than 96-bit ID. Two slots with the same index in B[.. ] and BG[.. ] are called a slot pair. In our scheme, the reader needs to record the numbers o the ollowing two types o slot pairs. N is the number o persistent-empty slot pairs, (i.e., B[i] = AND BG[i] =, i [, ]). N is the number o persistent-singleton slot pairs, (i.e., B[i] = AND BG[i] =, i [, ]). REB can estimate the cardinality o genuine tags by jointly using the number o persistent-empty slots and that o persistent-singleton slots. A persistent-empty slot happens only when no ID in U = B G is mapped to this index. Thus, N relects the cardinality u o U. Latter, we will show that a monotone unctional relationship can be established between u and N. REB uses this unction to estimate u rom N. Similarly, a persistent-singleton slot happens when only one ID in B G is mapped to this index. Thereore, N relects the cardinality B G (denoted as b ). Clearly, i we know u and b, we can get the cardinality g o genuine tags by calculating g = u b. It may not be suicient to satisy the required estimate accuracy by counting the numbers o N and N in a single rame. To improve the accuracy, REB requires the reader to execute k independent rames with dierent random number R. Note that, the rame size should be set no more than 5 in practice [], [9], [3] (the detailed reasons can be ound in literature [9]). I a large number o tags contend or such a short rame, most slots will become collision slots. To scale to a large tag population, we exploit the method stated in []. Speciically, the reader uses a persistence probability p (, ] to virtually extends the rame size to /p, but actually terminates the rame ater the irst slots. Fundamentally, each tag participates in the actual rame o slots with a probability p. C. Functional Estimator In this section, we derive the unctional estimator ˆg rom N and N or the REB protocol in one rame. For an arbitrary slot pair, the probability that it is,, denoted as p, is given as ollows. p = ( p )u e up () The approximation in Eq. () holds when /p is relatively large [5], [], [3]. The number o slot pairs,, i.e., N, ollows Bernoulli(, p ). The expectation and variance o the variable N are presented as ollows. E(N ) = p = e up () V ar(n ) = p ( p ) = e up ( e up ) (3) Similarly, we use p to denote the probability that a slot pair is,, which is given as ollows. ( ) b p = ( p )( p )u b p up e () The number o, slot pairs, i.e., N, also ollows Bernoulli(, p ). The expectation and variance o the variable N are presented as ollows. E(N ) = p = b pe up (5) V ar(n ) = p ( p ) = b pe up ( b p up e ) According to Eq. (), u can be expressed as ollows. u = p Dividing Eq. (5) by Eq. (), we have: (6) E(N) ln[ ] (7) E(N ) E(N = b p ) b = E(N) pe(n ) According to Eqs. (7)(8), g is expressed as ollows. g = u b = p E(N) ln[ ] E(N) pe(n ) By substituting N or E(N ) and N or E(N ) in Eq. (9), we get the estimator o g as ollows. (8) (9) ˆg = p ln( N ) N pn ()
4 That is, Eq. () exactly speciies how to use the observed N and N to estimate the cardinality g o genuine tags. Theorem presents the expectation and the variance o the estimate ˆg, which are very important to investigate the probabilistic accuracy o the estimator. Theorem. ˆg in Eq. () is an unbiased estimator o g, that is, E(ˆg) = g. The variance o the estimator is V ar(ˆg) = (b p + b p) p. p e up Proo: To get the expectation and variance o ˆg, we use a similar method in []. Since the variance expression is dierent rom [] [], we present the detailed proving procedures or the completeness o this paper. According to Eq. (), ˆg is a unction with respect to N and N. Hence, we denote ˆg as φ(n, N ), that is, ˆg = φ(n, N ). We present the Taylor s series expansion [5] o unction φ(n, N ) around (η, η ), where η = E(N ) and η = E(N ). φ(n, N ) φ(η, η )+[(N η ) N +(N η ) N ] () We have the ollowing equation by taking expectation o both sides o Eq. (). E[φ(N, N )] =φ(η, η ) + N E(N η ) + N E(N η ) = g () So ar, E(ˆg) = g is proved, that is, ˆg is an unbiased estimator o g. In what ollows, we investigate the variance o ˆg. V ar(ˆg) = E[ˆg E(ˆg)] =E[(N η ) N + (N η ) N ] =V ar(n )( N ) + V ar(n )( N ) + Cov(N, N ) N N (3) In the ollowing, we present how to get the covariance Cov(N, N ). Since Cov(N, N ) = E(N N ) E(N )E(N ), we calculate E(N N ) below. E(N N ) = x xyp [N = x N = y] x= y= ( ( ) x = xy )(p ) x x (p ) y ( p p ) ( x y) x y x= y= ( ) =p ( x) (p ) x ( p ) x x x= ( ) = pp (p ) x ( p ) x p x x= ( )(p ) p p ( p p p x x= ( x= ) x ) (p ) x ( p ) x (p ) x ( p ) x = p p ( )(p ) p p p = ( )p p p p p () As required by Eq. (3), we also calculate the irst-order partial derivatives o φ(n, N ) as ollows. N =η N N =η = e up ( b p ) N =η N N =η = up e p (5) We have obtained E(N N ) in Eq. (), E(N ) in Eq. (), and E(N ) in Eq. (5). Thus, we can calculate Cov(N, N ) as ollows. Cov(N, N ) = E(N N ) E(N )E(N ) = p p = b pe up (6) By combining Eqs. (3) (6) (5) (6) into Eq. (3), we then get the variance o ˆg as ollows. V ar(ˆg) = up e (b p + b p) p p, (7) where and p are the used rame size and the persistence probability, respectively. D. Reined Estimation with k Frames Because o probabilistic variance, the estimate ˆg got rom a single rame is hard to meet the predeined accuracy. By the law o large number [6], we issue k independent rames and use the average estimation result ˆg k = k k ˆg j to achieve a more accurate estimate in REB, where ˆg j is the estimate o g derived rom the j th rame. We propose Theorem to investigate how many independent rames are necessary to guarantee that the average estimate ˆg k can satisy the predeined (α, β) accuracy. Theorem. The reader perorms k independent rames. The average estimate ˆg k = k k ˆg j can guarantee the required (α, β) accuracy, i the rame number k satisies k Z β gα [ up j j e p j j (b p j + j b j p j ) j ], where p j j and p j are the rame size and persistence probability o the j th rame, respectively. Proo: We deine ˆg k = k k ˆg j as the average estimate o k successive rames, where ˆg j is the estimate o the j th rame, j [, k]. The reader initializes each rame with dierent random seeds. Hence, the estimate ˆg j is independent to each other. Thus, we have E( ˆg k ) = k k E(ˆg j) = g; and V ar( ˆg k ) = k k V ar(ˆg j). Clearly, the average estimate ˆg k still converges to the actual cardinality g. Given a required reliability β, the actual conidence interval is within [g Z β V ar( ˆgk ), g + Z β V ar( ˆgk )], where Z β is a percentile o β, e.g., i β = 95%, Z β will be.96. To guarantee the required conidence α, we should guarantee: g + Z β V ar( ˆg k ) g + gα g Z β V ar( ˆg k ) g gα Substituting k k V ar(ˆg j) or V ar( ˆg k ) and solving the above inequalities, we have: k Z β k V ar(ˆg j ) (8) gα
5 According to Eq. (7), we have V ar(ˆg j ) = up j j e p j j (b p j + j b j p j ) j p j into Eq. (8), we have: k Z β k [ gα jp j up j e j. Substituting it (b p j + j b jp j) j ] (9) p j When the above inequality holds, the predeined (α, β) accuracy can be satisied. Ater k rames, the backend server calculates the R.H.S. (Right Hand Side) o Eq. (9). I the result is less than (or equal to) k, the estimation process terminates; otherwise, the next rame continues to be issued. Note that, we do not know the actual u, b and g. We propose to use the irst k leading rames to estimate them, as shown in Eq. (). ˆu k = k ˆb k = k ˆg k = k ˆu j = k ˆb j = k ˆg j = k [ j ln( Nj )] p j j [ jnj p jn j ] [ j p j ln( Nj j ) jnj p jn j ], () where N j and N j are the numbers o persistent empty slots and persistent singleton slots observed in the j th rame. E. Avoiding Premature Termination In the execution o REB, we can get ˆu k, ˆb k and ˆg k ater k rames. However, their estimation is inaccurate due to probability variance. I we directly use them to calculate the R.H.S. o Eq. (9), k may have a chance to be larger than it, which is not true and REB will have a premature termination (i.e., the currently achieved accuracy has not met the required one yet). In the ollowing, we propose to solve the issue o premature termination. First, we calculate the variances o ˆu k, ˆb k and ˆg k as ollows. Note that, we can obtain the variances o ˆu k and ˆb k using similar method o getting V ar(ˆg k ). V ar(ˆu k ) = k V ar(ˆb k ) = k ˆu p k j j (e j ) p j ˆu p k j e j ( ˆb k + ˆb k ) j p j V ar(ˆg k ) = ˆu p k j e j (ˆb k j p kp j + j ˆb k jp j ) j j p j () When calculating the R.H.S. o Eq. (9), we can use ˆu k = ˆu k + δ V ar(ˆu k ) to substitute u, ˆb k = ˆb k + δ V ar(ˆb k ) to substitute the irst b, ˆb k = ˆb k δ V ar(ˆb k ) to substitute the second b, ˆg k = ˆg k +δ V ar(ˆg k ) to substitute g. In Section III, simulation results demonstrate that this tactic can eectively avoid the premature termination. The three-sigma rule [7] indicates δ = 3 is large enough. F. Dynamically Optimizing p and In REB, parameters p and can signiicantly aect the protocol perormance, thus need to be optimized. We use the inormation observed rom the x leading rames to acilitate the optimization o p and in the (x + ) th rame. The optimization goal is to minimize the execution time while guaranteeing the required (α, β) accuracy. In the irst rame, we set = 5. To coarsely set p, we modiy the scheme used in [], [8], [9]. Speciically, the reader keeps issuing one-slot rames. The persistence probability ollows a geometric distribution,,, 8,, i.e., the persistence probability in the γ th single-slot rame is. This process does not terminate until an empty slot γ appears. Assuming the l th slot is the irst empty slot, we have a coarse estimation o u to be l [8]. The persistence probability p o the irst rame is simply set to / l. In what ollows, we describe how to optimize p and or the (x+) th rame (x ). Since p and are correlated to minimize the total execution time, we irst ix the value to get an optimized p. The range o is rom to 5 and its value should be,, 8,, 5, as suggested in the CG standard. Thus, we can get an optimized by comparing all possible pairs o p and (with only 9 possible values). Note that, the proposed REB is not sensitive to the coarse settings o p and, because REB will quickly converge to a near-optimal setting o p and ater a ew rames, which will be demonstrated in the simulations. ) Optimizing p: We optimize p using a binary search method or a given value. Since the smaller the estimation variance o ˆg is, the less rames will be required, that is, the less the execution time ( rame number) is. We theoretically investigate how to optimize p to minimize the estimation variance V ar(ˆg) in Eq. (7). We prove that V ar(ˆg) is a convex unction o p (, ] in Theorem 3. By virtue o the convex property, we have two claims: (i) There is an optimal p op (, ] minimizing the variance V ar(ˆg). Taking Fig. (a)(b) or example. (ii) The irst order partial derivation presented in the ollowing Eq. () satisies p (, p op ), and p (p op, ],. Taking Fig. (c)(d) or example. = e up ( b u + b + u b u p p p ) + () 3 p 3 Based on the above two claims, we propose a binary-search algorithm to get the optimal p op or the j th rame, j. In step o Algorithm, δ speciies the maximum deviation between the outputted p and its actually optimal value. Initially, p high = and p low is set to a small enough value /ˆu x. By the while loop in steps, p high and p low progressively approach the optimal p op. When the optimization derivation is less than δ, the average value o p high and p low are returned as the optimal p. The complexity o Algorithm is Θ(lg δ ). Theorem 3. V ar(ˆg) in Eq. (7) is a convex unction o p. Proo: V ar(ˆg) is a convex unction o p (, ], i and only i its second order partial derivative satisies p
6 x 6 x 6 3 x 5 x 7 in Eq. (7) Var(ĝ) 8 6 Optimal p Var(ĝ)in Eq. (7) 5 3 Optimal p in Eq. () V ar(ĝ) Optimal p in Eq. () V ar(ĝ) 5 5 Optimal p persistence probability p (a) persistence probability p persistence probabilityp persistence probability p (b) (c) (d) Fig.. b =, b = 5, g =, = 5. (a) The variance V ar(ˆg) against p [., ]. (b) Magniied plot o (a), p [.,.]. (c) The irst order partial derivation o V ar(ˆg) against p [., ]. (d) Magniied plot o (c), p [.5,.]. ˆg (, ], >. We get its second order partial derivative as ollows. ˆg up =e ( b u + b u + u b u 3 p p b + u + 6 p 3 p ) } {{ } denoted as R 6 p (3) As shown in Eq. (3), we denote ( b u + b u+u 3 p b u p b +u p p ) as R. In what ollows, we irst prove R is always larger than. R =(b u p + b u p + u p b u p 3 b 3 p u 3 p + 6 )/( 3 p ) =[(b up up) + ( b up ) + 6 () 3 + ( up 3 3 ) + ( b u b ) 3 p]/( 3 p ) Since u > b in Eq. (), we have R >. Using the ourth-order Taylor series expansion, we have e up > + up + u p + u3 p u p 3. According to Eqs. (3)(), we have: ˆg up = e R 6 p >( + up + u p + u3 p u p 6 )R 3 p = ( u 3 p u3 b p 3 ) + 5u6 p 5 + p 5 5 (u b u3 + 3 ( u 3 p 3 3 ub 8 ) + u 3 3 (b u ) + u3 b p + u5 b p 3 u b + > 6 6 p 3 ) (5) ˆg >, which is a Eq. (5) indicates that p (, ], necessary and suicient condition to prove that V ar(ˆg) is a convex unction o p (, ]. ) Optimizing : We optimize or the (x+) th rame. Considering CG standard and practical constraints [], should take a value rom,, 8,, or 5. To improve the time-eiciency, it is reasonable to minimize the expected remaining execution time. We denote the minimum rame number that needs to be urther executed as y, our goal is: Minimizing ( + ) y (6) Algorithm : Optimizing p x+ or the (x+) th rame. Input: ˆu x, ˆb x, ˆg x, and. Output: The optimized p x+ or the (x + ) th rame. : δ =.; : p low = ˆu x ; 3: p high = ; : while p high p low > δ do 5: p = (p low + p high )/; 6: Calculating in Eq. (); 7: i ( > ) then 8: p high = p; 9: else : p low = p; : end i : end while 3: p x+ = (p low + p high )/; : return p x+ ; In Eq. (6), + means a slot or transmitting protocol parameters is ollowed by an -slot rame. According to the termination condition in Eq. (8), the value o y should satisy the ollowing inequality: x + y Z β x V ar( ˆg j) + yv ar(ˆg) (7) gα By solving the above inequality, we know that the minimum rame number y that needs to be urther executed is: Z β V ar(ˆg) x+ [ Z βv ar(ˆg) x x] g α g α + Z β V ar(ˆg j) x g α Here, V ar( ˆg j ) = up j jp e j j (b p j + j b j p j ) j p j (8), j [, x], V ar(ˆg) = p e up (b p + b p) p. g, u, b can be approximated by ˆg x, ˆu x, ˆb x, respectively. For any {,, 8,, 5}, we can use Algorithm to get the corresponding optimal p. Given each pair (, p), the smallest y can be obtained rom Eq. (8). Thus, we can get the optimal rom Eq. (6). The calculation complexity o optimizing p and is bounded by Θ(9 lg δ ).
7 G. REB with Multiple Readers and Blocker Tags In practice, a single reader cannot probe all the tags due to the limited communication ranges []. Similarly, a single blocker tag cannot protect all privacy-sensitive tags that may be distributed across the a large area. A solution is to deploy multiple readers and blocker tags with overlapping regions to cover the whole monitoring area. We assume all the readers and blocker tags are well synchronized by the excellent scheduling schemes [8] [3]. All parameters, p, R involved in REB are the same across all readers. In what ollows, we present how to distributively construct the global BG[.. ]. For an arbitrary slot s in a rame, i all the readers observe an empty slot, the backend server sets BG[s] = ; i no reader senses a collision and all the received RN6s are the same, the backend server sets BG[s] = ; i at least one reader senses a collision or dierent RN6s are observed by dierent readers, the backend server sets BG[s] = c. Based on these rules, the reader is able to generate a global actual array BG[.. ]. Logically, all the readers co-work like a super reader that is able to cover the whole area. The rest o REB in multi-reader scenarios is the same as what ormer sections have described. III. PERFORMANCE EVALUATION In this section, we conduct simulations to evaluate the perormance o REB in a large scale RFID system that contains thousands o tags. The simulators were implemented using MATLAB. Since REB in the multi-reader scenario is logically the same as that in the single reader scenario, this paper only simulates a single reader ollowing prior literature [7], [], [6], [3]. The setting o slot length is based on what we speciied in Section II-A. In the ollowing, we irst veriy the eectiveness o our optimization methods on and p. Then, we conduct simulations to evaluate the actual estimation reliability o REB and its time-eiciency. We run each simulation times and report the average results. A. Veriying the Optimized and p The setting o parameters and p is important to the perormance o REB. To achieve the overall optimal and p, it is necessary to know the values o u, b and g beore the execution o REB, which, however, are what we want to estimate. Using the simulation conditions shown in Fig. 3, the overall optimal is 8, and the overall optimal p is.75, which are calculated by the actual values o u, b and g. In the simulations corresponding to Fig. 3, we aim to veriy the convergence o and p to their overall optimal values. Results in Fig. 3 (a) demonstrate that about 8.5% o the independent simulations correctly take the overall optimal = 8 in the 3 rd rame. And this ratio reaches 5.5% in the th rame, that is, our REB has a good chance to take the overall optimal just ater the 3 rd rame. The simulation results in Fig. 3 (b) demonstrate that the persistent probability p approaches its overall optimal value rame by rame. The value o p taken in the th is very close to the optimal value.75. All in all, and p approach their overall optimal values rame by rame. The underlying reason is that more rames increase the estimation accuracy o u, b and g, which eventually acilitates the optimization o and p. Ratio o the taken rame size % =56 =5 =3 =6 =8 % % % % 9% =8 =56 =5.%.6% %.3% =3 =6.7% =8 =56 = % 8.5% %.8% =3 =6 5.5% 6.53% % =8 =56 =5.97% % =3 =6 Persistence probability the j th rame the j th (b) rame (a) actual persistence probability optimal persistence probability Fig. 3. Veriying the optimized settings o and p. B G = 5, B G = 5, G B = 5. α = %, β = 9%. (a) Veriying the optimized. (b) Veriying the optimized p. B. Estimation Reliability One o the most important perormance metrics or estimation protocols is the actual reliability. In an arbitrary simulation, i the estimate ˆg is within [g( α), g( + α)], we reer to it as a successul estimation. We record the success times among independent simulations. The ratio, i.e., success times/, is treated as the actual reliability. Simulation results in Fig. reveal that REB (δ = ) does not always meet the required reliability (i.e., β = 95%). The reason lies in the variances i directly using ˆu k, ˆb k and ˆg k to determine the termination condition. By taking their variances into consideration, the proposed δ-sigmabased termination tactic eectively avoids the premature termination. Simulation results in Fig. reveal that the actual reliability o REB (δ = ) and REB (δ = ) is always higher than the required one. Estimation Reliability δ δ δ 8 5 Estimation Reliability 3:: :3: :: Premature termination :: :: ::3 :: Cardinality o tag set U Tag ratio o B G B G G B (a) (b) Fig.. Evaluating the reliability o REB. α = 5%, β = 95%. (a) Tag ratio B G : B G : G B is ixed to : :, and u varies rom 3 to. (b) u is ixed to 9, and tag ratio varies. C. Time Eiciency Besides the estimation reliability, another important metric is time-eiciency. In this subsection, we evaluate the time-eiciency o the protocols given the same estimation accuracy. No existing estimation protocols can correctly approximate the cardinality o genuine tags in an RFID system with the presence o blocker tags. The only possible solution, to the best o our knowledge, is to perorm the comprehensive identiication protocols to identiy the tags in the system. Hence, we compare REB with two representative identiication protocols: one is the Tree Hopping
8 (TH) protocol [9]; the other one is the Enhanced Dynamic Framed Slotted ALOHA (EDFSA) protocol []. TH protocol terminates ater it traverses the whole tree. TH can identiy not only the IDs in (B G) (G B) when a queried preix is ollowed by a successul read, but also the IDs in B G when a preix whose length is equal to tag ID but still ollowed by a collision read. Then, we can get the set G, by calculating [(B G) (G B) B] (B G). The cardinality g is got upon getting G. As or EDFSA protocol, it executes rames round by round. In a round, only the IDs in (B G) (G B) have chance to be identiied. We denote the set o identiied IDs as S ident. Since the reader does not know whether all IDs in (B G) (G B) are completely identiied or even what percentage o them are identiied, EDFSA cannot terminate by itsel. For the sake o EDFSA, we assumes it can intelligently terminate once [ (B G) (G B) S ident ] < G α. ) Impact o Tag Cardinality: To investigate the impact o tag cardinality on the protocols execution time, we ix the tag ratio B G : B G : G B to ::, and vary u (indicating the system scale) rom to 5. The simulation results in Fig. 5 demonstrate that our REB signiicantly outperorms HT and EDFSA. For example, when u = 5, REB (δ = ) runs about times aster than EDFSA, and nearly 9 times aster than TH; while REB (δ = ) runs 33 times aster than EDFSA, and 68 times aster than TH. Moreover, the execution time o HT and EDFSA grows linearly as u increases. In contrast, our REB has a stable execution time, which reveals its good scalability against tag cardinality u. Execution time (s) Cardinality o tag set U 5 5 Fig. 5. Evaluating the time-eiciency o protocols with varying u. Tag ratio o B G : B G : G B is ixed to : : and α = 5%, β = 95%. ) Impact o Tag Ratio: The dierent tag ratio o B G : B G : G B may have signiicant impact on the execution time o protocols. Here, we ix u = 3, and evaluate the execution time o protocols with varying tag ratio. The simulation results in Fig. 6 demonstrate that our REB still outperorms the existing protocols by signiicantly reducing the execution time. Moreover, the results in Fig. 6 clearly show the perormance trend o the protocols with varying tag ratio, which are elaborated below. The results in Fig. 6 (a) reveal that the larger the ratio o tags in B G is, the larger the execution time o our REB scheme is. The underlying reason is that more tags in the set B G will incur more intererences to the process δ δ o estimating genuine tags. We make another two main observations rom Fig. 6 (b) which shows the execution time o the protocols with varying ratio o tags in B G. First, the perormance o identiication protocols deteriorates as the ratio o tags in B G increases. The reason is that more tags in B G will cause more blocking collisions, which seriously interere the tag identiication process. Second, the larger the ratio o tags in B G is, the smaller the execution time o our REB scheme is. The underlying intuitive reason is that larger ratio o tags in B G leads to smaller ratio o tags in B G, which decreases the intererence o tags in B G to the process o estimating g. Because o a similar reason, the results in Fig. 6 (c) reveal that the execution time o REB also decreases as the ratio o tags in G B increases. Execution time (s) Execution time (s) (a) the ratio o tags in B G varies (b) the ratio o tags in B G varies (c) the ratio o tags in G B varies Fig. 6. Evaluating the time-eiciency o protocols with varying tag ratio. u is ixed to 3, and α = 5%, β = 95%. IV. δ Execution time (s) RELATED WORK In the inant stage o RFID study, a great deal o attention was paid to the problem o tag identiication that aims to identiy the exact tag IDs. Generally, there are two types o identiication protocols: Aloha-based protocols [3] and Tree-based protocols [9]. Fundamentally, the Alohabased protocol is a kind o Time Division Multiple Access (TDMA) mechanism. A tag ID can be successully identiied in a slot when only one tag responds in this slot. As or tree-based protocols, the reader broadcasts a / string to query the tags. A tag responds with its ID once it inds that the querying string is the preix o its ID. A reader can successully identiy a tag ID when only one tag responds. Clearly, the execution time o identiication protocols is proportional to the tag population size. What is worse, in the RFID system with presence o blocker tags, the perormance o identiication protocols will urther deteriorate because o the blocking collisions caused by IDs in B G. To ast report the tag cardinality or various purposes such as timely stock monitoring, a great eort has been made to study the problem o tag estimation [5], [7], [], [3] [8], [3], [33] [35]. These estimation protocols leverage the observations rom Aloha/Tree protocols to statistically estimate the tag cardinality. For example, M. Shahzad et al. proposed the Average Run based Tag estimation (ART) by observing the average length o sequences o consecutive non-empty slots []. To the best o our knowledge, all these estimation protocols cannot address the problem o genuine tag estimation because they cannot exclude the intererence rom blocking tags. RFID privacy is o great importance but suers the threat rom malicious scanning. Ari Juels et al. proposed the blocker tags to protect the privacy-sensitive tags rom δ
9 malicious scanning []. Every coin has two sides. Ehsan Vahedi et al. indicated that the blocking technique causes a new threat to the RFID system. Speciically, a malicious blocker tag can prevent the valid reader rom reading the tags. An eicient scheme was proposed to detect the existence o an attacker in the RFID system [36]. Following the original purpose o proposing blocker tags, this paper still leverages the blocker tags to protect the privacy o genuine RFID tags. V. CONCLUSION This paper ormally deines a new problem o genuine tag cardinality estimation with the presence o blocker tags. To eiciently address this practically important problem, we propose the RFID Estimation scheme with Blocker tags (REB), which is compliant with the commodity EPC CG standard and does not require any modiications to othe-shel RFID tags. REB provides an unbiased unctional estimator which can guarantee any degree o estimation accuracy speciied by the users. Using REB, a retailer can timely monitor the product stock while blocker tags are being used to protect the privacy o some important items. Extensive simulation results reveal that REB is tens o times aster than the astest identiication protocol with the same accuracy requirement. ACKNOWLEDGMENT This work is supported by the National Science Foundation or Distinguished Young Scholars o China (Grant No. 65); the State Key Program o National Natural Science o China(Grant No. 63); NSFC under Grant nos. o 6736, 6736, 677, 6387, 6389, 63798, 63799, 678, 639 and 6756; HK RGC PolyU G-YM8; NSF grants ECCS 36, ECCS 89, CNS 38963, CNS 65, and CCF 867; the Jiangsu Future Internet Program under Grant No. BY395--8, and the Jiangsu High-level Innovation and Entrepreneurship (Shuangchuang) Program. REFERENCES [] K. Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identiication and Near-Field Communication, Wiley,. [] L. Yang, Y. Chen, X.-Y. Li, C. Xiao, M. Li, and Y. Liu, Tagoram: Real-Time Tracking o Mobile RFID Tags to High Precision Using COTS Devices, Proc. o ACM MobiCom,. [3] S. Qi, Y. Zheng, M. Li, L. Lu, and Y. Liu, COLLECTOR: A Secure RFID-Enabled Batch Recall Protocol, Proc. o IEEE INFOCOM,. [] T. Liu, L. Yang, Q. Lin, and Y. Liu, Anchor-ree Backscatter Positioning or RFID Tags with High Accuracy, Proc. o IEEE INFOCOM,. [5] L. Xie, H. Han, Q. Li, J. Wu, and S. Lu, Eiciently Collecting Histograms Over RFID Tags, Proc. o IEEE INFOCOM,. [6] J. Liu, B. Xiao, K. Bu, and L. Chen, Eicient Distributed Query Processing in Large RFID-enabled Supply Chains, Proc. o IEEE INFOCOM,. [7] Y. Zheng and M. Li, PET: Probabilistic Estimating Tree or Largescale RFID Estimation, IEEE Transactions on Mobile Computing, vol., no., pp ,. [8] M. Roberti, A 5-cent Breakthrough, RFID Journal, vol. 5, no. 6, 6. [9] [] M. Shahzad and A. X. Liu, Every Bit Counts: Fast and Scalable RFID Estimation, Proc. o ACM MobiCom,. [] A. Juels, R. L. Rivest, and M. Szydlo, The Blocker Tag: Selective Blocking o RFID Tags or Consumer Privacy, Proc. o ACM CCS, 3. [] [3] M. Kodialam and T. Nandagopal, Fast and Reliable Estimation Schemes in RFID Systems, Proc. o ACM Mobicom, 6. [] M. Kodialam, T. Nandagopal, and W. C. Lau, Anonymous Tracking using RFID tags, Proc. o IEEE INFOCOM, 7. [5] C. Qian, H. Ngan, Y. Liu, and L. M. Ni, Cardinality Estimation or Large-scale RFID Systems, IEEE Transactions on Parallel and Distributed Systems, vol., no. 9, pp. 5,. [6] B. Chen, Z. Zhou, and H. Yu, Understanding RFID Counting Protocols, Proc. o ACM MobiCom, 3. [7] Y. Zheng and M. Li, ZOE: Fast Cardinality Estimation or Large- Scale RFID Systems, Proc. o IEEE INFOCOM, 3. [8] T. Li, S. Wu, S. Chen, and M. Yang, Energy Eicient Algorithms or the RFID Estimation Problem, Proc. o IEEE INFOCOM,. [9] M. Shahzad and A. X. Liu, Probabilistic Optimal Tree Hopping or RFID Identiication, Proc. o ACM SIGMETRICS, 3. [] S. Lee, S. Joo, and C. Lee, An Enhanced Dynamic Framed Slotted ALOHA Algorithm or RFID Tag Identiication, Proc. o IEEE MobiQuitous, 5. [] P. Semiconductors, I-CODE Smart Label RFID Tags, nxp.com/acrobat download/other/identiication/sl93.pd,. [] E. Inc, Radio-requency Identity Protocols Class- Generation- UHF RFID Protocol or Communications at 86 mhz-96 mhz, EPCGlobal, Inc,.. ed., 8. [3] W. Gong, K. Liu, X. Miao, Q. Ma, Z. Yang, and Y. Liu, Inormative Counting: Fine-grained Batch Authentication or Large-Scale RFID Systems, Proc. o ACM MobiHoc, 3. [] X. Liu, K. Li, H. Qi, B. Xiao, and X. Xie, Fast Counting the Key Tags in Anonymous RFID Systems, Proc. o IEEE ICNP,. [5] D. E. Smith, A source book in mathematics, Courier Dover Publications,. [6] M. Schilling, Understanding Probability: Chance Rules in Everyday Lie, The American Statistician, vol. 6, no., pp , 6. [7] S. N. V and D.-B. IV, Mathematische Statistik in der Technik, Deutscher Verl. der Wissenschaten, 963. [8] L. Yang, J. Han, Y. Qi, C. Wang, T. Gux, and Y. Liu, Season: Shelving Intererence and Joint Identiication in Large-Scale RFID Systems, Proc. o IEEE INFOCOM,. [9] S. Tang, J. Yuan, M. Li, G. Chen, Y. Liu, and J. Zhao, Raspberry: A Stable Reader Activation Scheduling Protocol in Multi-reader RFID Systems, Proc. o IEEE ICNP, 9. [3] J. Waldrop, D. W. Engels, and S. E. Sarma, Colorwave: An Anticollision Algorithm or the Reader Collision Problem, 3. [3] T. Li, S. Chen, and Y. Ling, Identiying the Missing Tags in a Large RFID System, Proc. o ACM MobiHoc,. [3] F. C. Schoute, Dynamic Frame Length ALOHA, IEEE Transactions on Communications, vol. 3, no., pp , 983. [33] W. Gong, K. Liu, X. Miao, and H. Liu, Arbitrarily Accurate Approximation Scheme or Large-Scale RFID Cardinality Estimation, Proc. o IEEE INFOCOM,. [3] H. Liu, W. Gong, L. Chen, W. He, K. Liu, and Y. Liu, Generic Composite Counting in RFID Systems, Proc. o IEEE ICDCS,. [35] Q. Xiao, B. Xiao, and S. Chen, Dierential Estimation in Dynamic RFID Systems, Proc. o IEEE INFOCOM, 3. [36] E. Vahedi, V. Shah-Mansouri, V. W. S. Wong, I. F.Blake, and R. K. Ward, Probabilistic Analysis o Blocking Attack in RFID Systems, IEEE Transactions on Inormation Forensics and Security, vol. 6, no. 3, pp ,.
Efficient Continuous Scanning in RFID Systems
Eicient Continuous Scanning in RFID Systems Bo Sheng Northeastern University Email: shengbo@ccs.neu.edu Qun Li College o William and Mary Email: liqun@cs.wm.edu Weizhen Mao College o William and Mary Email:
More informationEfficient Missing Tag Detection in RFID Systems
Efficient Missing Tag Detection in RFID Systems Wen Luo Shigang Chen Tao Li Shiping Chen Department of Computer & Information Science & Engineering, University of Florida, Florida, USA Network Information
More informationA MPCP-Based Centralized Rate Control Method for Mobile Stations in FiWi Access Networks
A MPCP-Based Centralized Rate Control Method or Mobile Stations in FiWi Access Networks 215 IEEE. Personal use o this material is permitted. Permission rom IEEE must be obtained or all other uses, in any
More informationA Time-efficient Information Collection Protocol for Large-scale RFID Systems
202 Proceedings IEEE INFOCOM A Time-efficient Information Collection Protocol for Large-scale RFID Systems Hao Yue, Chi Zhang, Miao Pan, Yuguang Fang and Shigang Chen Department of Electrical and Computer
More informationMaintenance Scheduling Optimization for 30kt Heavy Haul Combined Train in Daqin Railway
5th International Conerence on Civil Engineering and Transportation (ICCET 2015) Maintenance Scheduling Optimization or 30kt Heavy Haul Combined Train in Daqin Railway Yuan Lin1, a, Leishan Zhou1, b and
More informationHow To Balance Load In Rdi With Power Conservation In A Power Efficient System
EFFECTIVE LOAD BALANCING WITH POWER CONSERVATION IN RFID Vijayakumar.G.Dhas 1, Ramanathan Muthukaruppan 2, Konguvel Balakrishnan 2, Rajarajan Ganesan 2 1 Lecturer, Department of Information Technology,
More informationA Study on the Security of RFID with Enhancing Privacy Protection
A Study on the Security of RFID with Enhancing Privacy Protection *Henry Ker-Chang Chang, *Li-Chih Yen and *Wen-Chi Huang *Professor and *Graduate Students Graduate Institute of Information Management
More informationAn improved on-line algorithm for scheduling on two unrestrictive parallel batch processing machines
This is the Pre-Published Version. An improved on-line algorithm for scheduling on two unrestrictive parallel batch processing machines Q.Q. Nong, T.C.E. Cheng, C.T. Ng Department of Mathematics, Ocean
More informationA Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,
More informationAN ENHANCED BINARY ANTI-COLLISION ALGORITHM OF BACKTRACKING IN RFID SYSTEM
Progress In Electromagnetics Research B, Vol. 4, 263 271, 2008 AN ENHANCED BINARY ANTI-COLLISION ALGORITHM OF BACKTRACKING IN RFID SYSTEM X.-L. Shi, X.-W. Shi, Q.-L. Huang, and F. Wei National Key Laboratory
More informationResearch on the UHF RFID Channel Coding Technology based on Simulink
Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai
More informationFIXED INCOME ATTRIBUTION
Sotware Requirement Speciication FIXED INCOME ATTRIBUTION Authors Risto Lehtinen Version Date Comment 0.1 2007/02/20 First Drat Table o Contents 1 Introduction... 3 1.1 Purpose o Document... 3 1.2 Glossary,
More informationPrediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
More informationPrivacy and Security in library RFID Issues, Practices and Architecture
Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library
More information1 Error in Euler s Method
1 Error in Euler s Method Experience with Euler s 1 method raises some interesting questions about numerical approximations for the solutions of differential equations. 1. What determines the amount of
More informationContactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
More informationMining the Situation: Spatiotemporal Traffic Prediction with Big Data
1 Mining the Situation: Spatiotemporal Traic Prediction with Big Data Jie Xu, Dingxiong Deng, Ugur Demiryurek, Cyrus Shahabi, Mihaela van der Schaar Abstract With the vast availability o traic sensors
More informationProtocol Design for Neighbor Discovery in AD-HOC Network
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 915-922 International Research Publication House http://www.irphouse.com Protocol Design for
More informationA Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster
, pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing
More informationEfficient Novel Anti-collision Protocols for Passive RFID Tags
Efficient Novel Anti-collision Protocols for Passive RFID Tags Three methods for fast tag identification: bislotted tree based RFID tag anti-collision protocols, query tree based reservation, and the combining
More informationBack-end Server Reader Tag
A Privacy-preserving Lightweight Authentication Protocol for Low-Cost RFID Tags Shucheng Yu, Kui Ren, and Wenjing Lou Department of ECE, Worcester Polytechnic Institute, MA 01609 {yscheng, wjlou}@wpi.edu
More informationCopyright 2005 IEEE. Reprinted from IEEE MTT-S International Microwave Symposium 2005
Copyright 2005 IEEE Reprinted rom IEEE MTT-S International Microwave Symposium 2005 This material is posted here with permission o the IEEE. Such permission o the IEEE does t in any way imply IEEE endorsement
More informationLoad Balancing Algorithm Based on Services
Journal of Information & Computational Science 10:11 (2013) 3305 3312 July 20, 2013 Available at http://www.joics.com Load Balancing Algorithm Based on Services Yufang Zhang a, Qinlei Wei a,, Ying Zhao
More informationSecurity and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags
Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags Seyed Mohammad Alavi 1, Karim Baghery 2 and Behzad Abdolmaleki 3 1 Imam Hossein Comprehensive University Tehran, Iran
More informationEnabling the secure use of RFID
Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises
More informationAM Receiver. Prelab. baseband
AM Receiver Prelab In this experiment you will use what you learned in your previous lab sessions to make an AM receiver circuit. You will construct an envelope detector AM receiver. P1) Introduction One
More informationA NOVEL ALGORITHM WITH IM-LSI INDEX FOR INCREMENTAL MAINTENANCE OF MATERIALIZED VIEW
A NOVEL ALGORITHM WITH IM-LSI INDEX FOR INCREMENTAL MAINTENANCE OF MATERIALIZED VIEW 1 Dr.T.Nalini,, 2 Dr. A.Kumaravel, 3 Dr.K.Rangarajan Dept o CSE, Bharath University Email-id: nalinicha2002@yahoo.co.in
More informationCHAPTER 2 Estimating Probabilities
CHAPTER 2 Estimating Probabilities Machine Learning Copyright c 2016. Tom M. Mitchell. All rights reserved. *DRAFT OF January 24, 2016* *PLEASE DO NOT DISTRIBUTE WITHOUT AUTHOR S PERMISSION* This is a
More informationSmall Cell Traffic Balancing Over Licensed and Unlicensed Bands
1 Small Cell Traic Balancing Over Licensed and Unlicensed Bands Feilu Liu, Erdem Bala, Elza Erkip, Mihaela C. Beluri and Rui Yang arxiv:1501.00203v1 [cs.ni] 31 Dec 2014 Abstract The 3rd Generation Partnership
More informationA performance analysis of EtherCAT and PROFINET IRT
A perormance analysis o EtherCAT and PROFINET IRT Conerence paper by Gunnar Prytz ABB AS Corporate Research Center Bergerveien 12 NO-1396 Billingstad, Norway Copyright 2008 IEEE. Reprinted rom the proceedings
More informationVictor Shoup Avi Rubin. fshoup,rubing@bellcore.com. Abstract
Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,rubing@bellcore.com Abstract In this paper, we investigate a method by which smart
More informationA RAPID METHOD FOR WATER TARGET EXTRACTION IN SAR IMAGE
A RAPI METHO FOR WATER TARGET EXTRACTION IN SAR IMAGE WANG ong a, QIN Ping a ept. o Surveying and Geo-inormatic Tongji University, Shanghai 200092, China. - wangdong75@gmail.com ept. o Inormation, East
More informationTHE SECURITY AND PRIVACY ISSUES OF RFID SYSTEM
THE SECURITY AND PRIVACY ISSUES OF RFID SYSTEM Iuon Chang Lin Department of Management Information Systems, National Chung Hsing University, Taiwan, Department of Photonics and Communication Engineering,
More informationIs the trailing-stop strategy always good for stock trading?
Is the trailing-stop strategy always good or stock trading? Zhe George Zhang, Yu Benjamin Fu December 27, 2011 Abstract This paper characterizes the trailing-stop strategy or stock trading and provides
More informationReflection and Refraction
Equipment Reflection and Refraction Acrylic block set, plane-concave-convex universal mirror, cork board, cork board stand, pins, flashlight, protractor, ruler, mirror worksheet, rectangular block worksheet,
More informationTCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
More informationA RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers
, pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang
More informationTime-Memory Trade-Offs: False Alarm Detection Using Checkpoints
Time-Memory Trade-Os: False Alarm Detection Using Checkpoints Gildas Avoine 1, Pascal Junod 2, and Philippe Oechslin 1,3 1 EPFL, Lausanne, Switzerland 2 Nagravision SA (Kudelski Group), Switzerland 3 Objecti
More informationOPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6 Virender Kumar Department of Electronics & Communication Engineering, HCTM Technical Campus, Kaithal, India gangotrahctm@gmail.com ABSTRACT Mobile
More informationCombinational-Circuit Building Blocks
May 9, 24 :4 vra6857_ch6 Sheet number Page number 35 black chapter 6 Combinational-Circuit Building Blocks Chapter Objectives In this chapter you will learn about: Commonly used combinational subcircuits
More informationFurther Analysis Of A Framework To Analyze Network Performance Based On Information Quality
Further Analysis Of A Framework To Analyze Network Performance Based On Information Quality A Kazmierczak Computer Information Systems Northwest Arkansas Community College One College Dr. Bentonville,
More informationFinancial Services [Applications]
Financial Services [Applications] Tomáš Sedliačik Institute o Finance University o Vienna tomas.sedliacik@univie.ac.at 1 Organization Overall there will be 14 units (12 regular units + 2 exams) Course
More informationMAC Scheduling for High Throughput Underwater Acoustic Networks
MAC Scheduling for High Throughput Underwater Acoustic Networks Yang Guan Chien-Chung Shen Department of Computer and Information Sciences University of Delaware, Newark, DE, USA {yguan,cshen}@cis.udel.edu
More informationDoppler Shift Estimation for TETRA Cellular Networks
oppler Shit Estimation or TETRA Cellular Networks Javad Ashar Jahanshahi, Seyed Ali Ghorashi epartment o Electrical and Computer Engineering, Shahid Beheshti University, Tehran, Iran j.ashar@mail.sbu.ac.ir,
More informationPatch management is a crucial component of information security management. An important problem within
MANAGEMENT SCIENCE Vol. 54, No. 4, April 2008, pp. 657 670 issn 0025-1909 eissn 1526-5501 08 5404 0657 inorms doi 10.1287/mnsc.1070.0794 2008 INFORMS Security Patch Management: Share the Burden or Share
More informationTHE MODELING AND CALCULATION OF SOUND RADIATION FROM FACILITIES WITH GAS FLOWED PIPES INTRODUCTION
THE MODELING AND CALCULATION OF SOUND ADIATION FOM FACILITIES WITH GAS FLOWED PIPES INTODUCTION Analysis o the emission caused by industrial acilities like chemical plants, reineries or other production
More informationRetrospective Test for Loss Reserving Methods - Evidence from Auto Insurers
Retrospective Test or Loss Reserving Methods - Evidence rom Auto Insurers eng Shi - Northern Illinois University joint work with Glenn Meyers - Insurance Services Oice CAS Annual Meeting, November 8, 010
More informationThwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
More informationFRIEND: A PREHANDSHAKING NEIGHBOR DISCOVERY PROTOCOL FOR WIRELESS AD HOC NETWORKS
FRIEND: A PREHANDSHAKING NEIGHBOR DISCOVERY PROTOCOL FOR WIRELESS AD HOC NETWORKS 1 Ramya S, Research scholar, M.Tech CNE (PT), NIE, Mysore 2 Dr. Phaneendra H D, Professor, Dept. of ISE, NIE, Mysore ABSTRACT-
More informationVoice Service Support over Cognitive Radio Networks
Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,
More informationWhy focus on assessment now?
Assessment in th Responding to your questions. Assessment is an integral part o teaching and learning I this sounds amiliar to you it s probably because it is one o the most requently quoted lines rom
More informationFirewall Verification and Redundancy Checking are Equivalent
Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin acharya@cs.utexas.edu M. G. Gouda National Science Foundation University of Texas at Austin mgouda@nsf.gov
More informationLANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
More informationStrengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
More informationRFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
More informationStudy of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
More informationHigh School Students Who Take Acceleration Mechanisms Perform Better in SUS Than Those Who Take None
May 2008 Dr. Eric J. Smith, Commissioner Dr. Willis N. Holcombe, Chancellor High School Who Take Acceleration Mechanisms Perorm Better in SUS Than Those Who Take None Edition 2008-01 Introduction. is one
More informationEFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,
More informationLightweight Cryptography. Lappeenranta University of Technology
Lightweight Cryptography Dr Pekka Jäppinen Lappeenranta University of Technology Outline Background What is lightweight Metrics Chip area Performance Implementation tradeoffs Current situation Conclusions
More informationA Proposal for Estimating the Order Level for Slow Moving Spare Parts Subject to Obsolescence
usiness, 2010, 2, 232-237 doi:104236/ib201023029 Published Online September 2010 (http://wwwscirporg/journal/ib) A Proposal or Estimating the Order Level or Slow Moving Spare Parts Subject to Obsolescence
More informationSecurity Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols
Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols Ehsan Vahedi, Rabab K. Ward and Ian F. Blake Department of Electrical and Computer Engineering The University of British
More informationA FRAMEWORK FOR AUTOMATIC FUNCTION POINT COUNTING
A FRAMEWORK FOR AUTOMATIC FUNCTION POINT COUNTING FROM SOURCE CODE Vinh T. Ho and Alain Abran Sotware Engineering Management Research Laboratory Université du Québec à Montréal (Canada) vho@lrgl.uqam.ca
More informationA Network Equilibrium Framework for Internet Advertising: Models, Quantitative Analysis, and Algorithms
A Network Equilibrium Framework or Internet Advertising: Models, Quantitative Analysis, and Algorithms Lan Zhao and Anna Nagurney IFORS - Hong Kong June 25-28, 2006 Lan Zhao Department o Mathematics and
More informationA TCP-like Adaptive Contention Window Scheme for WLAN
A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan
More informationChapter 3. Cartesian Products and Relations. 3.1 Cartesian Products
Chapter 3 Cartesian Products and Relations The material in this chapter is the first real encounter with abstraction. Relations are very general thing they are a special type of subset. After introducing
More informationMissing-Tag Detection and Energy Time Tradeoff in Large-Scale RFID Systems With Unreliable Channels
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 4, AUGUST 2014 1079 Missing-Tag Detection and Energy Time Tradeoff in Large-Scale RFID Systems With Unreliable Channels Wen Luo, Shigang Chen, Senior Member,
More informationAn Energy Efficient Location Service for Mobile Ad Hoc Networks
An Energ Efficient Location Service for Mobile Ad Hoc Networks Zijian Wang 1, Euphan Bulut 1 and Boleslaw K. Szmanski 1, 1 Department of Computer Science, Rensselaer Poltechnic Institute, Tro, NY 12180
More informationCopula model estimation and test of inventory portfolio pledge rate
International Journal of Business and Economics Research 2014; 3(4): 150-154 Published online August 10, 2014 (http://www.sciencepublishinggroup.com/j/ijber) doi: 10.11648/j.ijber.20140304.12 ISS: 2328-7543
More informationComments on "public integrity auditing for dynamic data sharing with multi-user modification"
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2016 Comments on "public integrity auditing for dynamic
More informationAn Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2000 1x EVDO and LTE Systems
ICWMC 211 : The Seventh International Conference on Wireless and Mobile Communications An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2 1x EVDO and LTE Systems Xinsheng
More informationLibRFID: Automation Software for Library Management System Using RFID Technology
LibRFID: Automation Software for Library Management System Using RFID Technology Amar Michael Sequeira 1 Lecturer, Department of Computer Science, Bhandarkars Arts and Science College, Kundapura, Udupi,
More informationDeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks
: Deuce-Based Fast Handoff Scheme in IEEE 82.11 Wireless Networks Yuh-Shyan Chen, Chung-Kai Chen, and Ming-Chin Chuang Department of Computer Science and Information Engineering National Chung Cheng University,
More informationACL Based Dynamic Network Reachability in Cross Domain
South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer
More informationIII. DIVERSITY-MULTIPLEXING TRADEOFF Theorem 3.1: The maximum achievable DMT for network described in Sec II is given by,
iversity Gain d(r) 4 35 3 5 5 05 x MIMO MT bound Proximity gain 4 Proximity gain Proximity gain 8 Proximity gain 0 0 05 5 Multiplexing Gain (r) Fig d(r) or various values o proximity gain η III IVERITY-MULTIPLEXING
More informationScalable Bloom Filters
Scalable Bloom Filters Paulo Sérgio Almeida Carlos Baquero Nuno Preguiça CCTC/Departamento de Informática Universidade do Minho CITI/Departamento de Informática FCT, Universidade Nova de Lisboa David Hutchison
More informationFigure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
More informationIN THIS PAPER, we study the delay and capacity trade-offs
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness
More informationInternational Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
More informationMessage authentication
Message authentication -- Hash based MAC unctions -- MAC unctions based on bloc ciphers -- Authenticated encryption (c) Levente Buttyán (buttyan@crysys.hu) Secret preix method MAC (x) = H( x) insecure!
More informationAnalog/Digital Conversion. Analog Signals. Digital Signals. Analog vs. Digital. Interfacing a microprocessor-based system to the real world.
Analog/Digital Conversion Analog Signals Interacing a microprocessor-based system to the real world. continuous range x(t) Analog and digital signals he bridge: Sampling heorem Conversion concepts Conversion
More informationTheoretical Computer Science
Theoretical Computer Science 410 (2009) 4489 4503 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs A push relabel approximation algorithm
More informationRFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark
April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for
More informationLoad Balancing on a Grid Using Data Characteristics
Load Balancing on a Grid Using Data Characteristics Jonathan White and Dale R. Thompson Computer Science and Computer Engineering Department University of Arkansas Fayetteville, AR 72701, USA {jlw09, drt}@uark.edu
More informationLabor Demand. 1. The Derivation of the Labor Demand Curve in the Short Run:
CON 361: Labor conomics 1. The Derivation o the Curve in the Short Run: We ill no complete our discussion o the components o a labor market by considering a irm s choice o labor demand, beore e consider
More informationCloud Storage and Online Bin Packing
Cloud Storage and Online Bin Packing Doina Bein, Wolfgang Bein, and Swathi Venigella Abstract We study the problem of allocating memory of servers in a data center based on online requests for storage.
More informationAn Intelligent Middleware Platform and Framework for RFID Reverse Logistics
International Journal of Future Generation Communication and Networking 75 An Intelligent Middleware Platform and Framework for RFID Reverse Logistics Jihyun Yoo, and Yongjin Park Department of Electronics
More informationCall Tracking & Google Analytics Integration
Call Tracking & Google Analytics Integration A How to Guide Table o contents Integrating call tracking with web data Why? The beneits What you need to get started Virtual Telephone Numbers A Google Analytics
More informationThe allocation algorithm for data centers in cloud computing architecture from security perspective
The allocation algorithm for data centers in cloud computing architecture from security perspective *Chuan-Gang Liu 1,Hsin-Yi Lin, Kun-Ta Hsien Deparament of Information Technology, Chia Nan University
More informationEnhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
More informationOptimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks
Optimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks Rahul Urgaonkar IBM TJ Watson Research Center Yorktown Heights, NY 10598 Email: rurgaon@us.ibm.com Prithwish Basu and Saikat Guha
More informationSection 1.3 P 1 = 1 2. = 1 4 2 8. P n = 1 P 3 = Continuing in this fashion, it should seem reasonable that, for any n = 1, 2, 3,..., = 1 2 4.
Difference Equations to Differential Equations Section. The Sum of a Sequence This section considers the problem of adding together the terms of a sequence. Of course, this is a problem only if more than
More informationPROPERTIES OF THE SAMPLE CORRELATION OF THE BIVARIATE LOGNORMAL DISTRIBUTION
PROPERTIES OF THE SAMPLE CORRELATION OF THE BIVARIATE LOGNORMAL DISTRIBUTION Chin-Diew Lai, Department of Statistics, Massey University, New Zealand John C W Rayner, School of Mathematics and Applied Statistics,
More informationRN-coding of Numbers: New Insights and Some Applications
RN-coding of Numbers: New Insights and Some Applications Peter Kornerup Dept. of Mathematics and Computer Science SDU, Odense, Denmark & Jean-Michel Muller LIP/Arénaire (CRNS-ENS Lyon-INRIA-UCBL) Lyon,
More informationOn the Security of RFID
On the Security of RFID Hung-Min Sun Information Security Lab. Department of Computer Science National Tsing Hua University slide 1 What is RFID? Radio-Frequency Identification Tag Reference http://glossary.ippaper.com
More informationPrivacy Preserving Distributed Cloud Storage
Privacy Preserving Distributed Cloud Storage Praveenkumar Khethavath 1 *, Doyel Pal 2 1 Department of Mathematics, Engineering and Computer Science, LaGuardia Community College, Long Island City, NY 11101.
More informationA Load Balancing Method in SiCo Hierarchical DHT-based P2P Network
1 Shuang Kai, 2 Qu Zheng *1, Shuang Kai Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn 2, Qu Zheng Beijing University of Posts and Telecommunications, buptquzheng@gmail.com Abstract
More informationUser Guide. Introduction. HCS12PLLCALUG/D Rev. 0, 12/2002. HCS12 PLL Component Calculator
User Guide HCS12PLLCALUG/D Rev. 0, 12/2002 HCS12 PLL Component Calculator by Stuart Robb Applications Engineering Motorola, East Kilbride Introduction The MC9S12D amily o MCUs includes a Phase-Locked Loop
More informationOptics. Kepler's telescope and Galileo's telescope. f 1. f 2. LD Physics Leaflets P5.1.4.2. Geometrical optics Optical instruments
Optics Geometrical optics Optical instruments LD Physics Lealets P5.1.4.2 Kepler's telescope and Galileo's telescope Objects o the experiment g Veriying that the length o a telescope is given by the sum
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationIntegrated airline scheduling
Computers & Operations Research 36 (2009) 176 195 www.elsevier.com/locate/cor Integrated airline scheduling Nikolaos Papadakos a,b, a Department o Computing, Imperial College London, 180 Queen s Gate,
More information