Quantization Strategies of RFID Routing in Internet of Things

Article Preview

Abstract:

This paper researches wireless RFID routings in Internet of Things based on the idea of quantization. The researches include the obtaining of routing contexts, the measurement of contexts in evaluating the performance of routing, methods for controlling the quantification of contexts, the realization of a perceptive computational model, the mergence of the security policies. Its goal is to construct a precise lightweight and perceptive model of wireless RFID routing protocols in Internet of Things, and to lay a foundation for accelerating the developments in Internet of Things.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

148-152

Citation:

Online since:

October 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Shahbazi Saeed, Harwood Aaron, Karunasekera Shanika, Achieving ubiquitous network connectivity using an RFID tag-based routing protocol, Proceedings of the 2008 14th IEEE International Conference on Parallel and Distributed Systems, pp.391-398.

DOI: 10.1109/icpads.2008.29

Google Scholar

[2] Zuniga Marco, Hauswirth Manfred, Hansel: Distributed localization in passive wireless environments, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON (2009).

DOI: 10.1109/sahcn.2009.5168937

Google Scholar

[3] Cabrera Altamirano Iván, Rodríguez Henríquez Francisco, A scalable intelligent room based on wireless sensor networks and RFIDs , Program and Abstract Book - 2010 7th International Conference on Electrical Engineering, Computing Science and Automatic Control, CCE 2010, pp.434-439.

DOI: 10.1109/iceee.2010.5608607

Google Scholar

[4] Lu Xu, The research on the cluster-based RFID wireless sensor network routing protocol, PHD thesis of Guangdong University of Uechnology, (2009).

Google Scholar

[5] Madan B, Goševa-Popstojanova K, Vaidyanathan K, Trivedi KS. Modeling and quantification of security attributes of software systems. In: Proc. of the Int'l Conf. on Dependable Systems and Networks (DSN 2002). Washington: IEEE Computer Society, 2002. 505−514.

DOI: 10.1109/dsn.2002.1028941

Google Scholar

[6] Hu Hanping, Chen Xiang, Zhang Baoliang, Guo Wenxuan, An Approach to Measure and Evaluate the Network Security, journal of software , 2005 Vol. 16 No. 11, p.1939-(1945).

DOI: 10.1109/ipdps.2005.46

Google Scholar

[7] Chen Xiuzhen, Zhen Qinghua, Guan Xiaohong, Lin Chengguang, Quantitative Hierarchical Threat Evaluation Model for Network Security, Journal On Communications, Vol. 17, No. 4, April 2006, p.885−897.

Google Scholar

[8] Pan Haijun, Lu Kuijun, Wu Chaohui, Research of Trust Quantification Based on Grid System , Application Research Of Computers, 2005. 10, pp.49-55.

Google Scholar

[9] Zhou Yan, The quantification-based estimation and fusion of target states in wireless sensor network, PHD thesis of Shanghai Jiao Tong Uniersity, (2010).

Google Scholar

[10] LU Jun, RUAN Qiu—qi, Quantified Cost-Balanced Routing for Overlay Multicast, Chinese Journal Of Electronics, 2006 Vo. l34 No. 7, pp.1316-1320.

Google Scholar

[11] Yang Guang, Research on Secure Routing Protocols for Wireless Sensor Networks, PHD thesis of Harbin Engineering University, (2009).

Google Scholar

[12] Zhang Hong Bin, Yang Chao, Ma Jian Feng, Adjoining trust based routing security assessment, Journal Of JiLin University (Engineering And Technology Edition), Vol. 39 No. 2 (2009).

Google Scholar