Prevention and detection methods for enhancing security in an RFID system

JH Khor, W Ismail, MG Rahman - International Journal of …, 2012 - journals.sagepub.com
Low-cost radio frequency identification (RFID) tag is exposed to various security and privacy
threats due to computational constraint. This paper proposes the use of both prevention and …

Nowhere to hide: Efficiently identifying probabilistic cloning attacks in large-scale RFID systems

X Ai, H Chen, K Lin, Z Wang, J Yu - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Radio-Frequency Identification (RFID) is an emerging technology which has been widely
applied in various scenarios, such as tracking, object monitoring, and social networks, etc …

[HTML][HTML] Iot device security: Challenging “a lightweight rfid mutual authentication protocol based on physical unclonable function”

Y Bendavid, N Bagheri, M Safkhani, S Rostampour - Sensors, 2018 - mdpi.com
With the exponential increase of Internet of things (IoT) connected devices, important
security risks are raised as any device could be used as an attack channel. This …

IoT devices fingerprinting using deep learning

H Jafari, O Omotere, D Adesina… - MILCOM 2018-2018 …, 2018 - ieeexplore.ieee.org
Radio Frequency (RF) fingerprinting as a physical layer authentication method could be
used to distinguish legitimate wireless devices from adversarial ones. In this paper, we …

Anti-counterfeiting via federated rfid tags' fingerprints and geometric relationships

L Yang, P Peng, F Dang, C Wang… - 2015 IEEE Conference …, 2015 - ieeexplore.ieee.org
RFID has been widely adopted as an effective method for anti-counterfeiting. Legacy
systems based on security protocol are either too heavy to be affordable by passive tags or …

ARMOR: An anti-counterfeit security Mechanism for lOw cost Radio frequency identification systems

Y Yilmaz, VH Do, B Halak - IEEE Transactions on Emerging …, 2020 - ieeexplore.ieee.org
Counterfeited products are costing the global economy hundreds of billions of dollars
annually. Radio frequency identification (RFID) technology provides a promising solution for …

Lightweight security protocol for chipless RFID in Internet of Things (IoT) applications

V Sharma, A Vithalkar, M Hashmi - 2018 10th International …, 2018 - ieeexplore.ieee.org
The RFID based communication between objects within the framework of IoT is potentially
very efficient in terms of power requirements and system complexity. The new design …

The tags are alright: Robust large-scale RFID clone detection through federated data-augmented radio fingerprinting

M Piva, G Maselli, F Restuccia - … Design for Mobile Networks and Mobile …, 2021 - dl.acm.org
Millions of RFID tags are pervasively used all around the globe to inexpensively identify a
wide variety of everyday-use objects. One of the key issues of RFID is that tags cannot use …

Cdta: A comprehensive solution for counterfeit detection, traceability, and authentication in the iot supply chain

K Yang, D Forte, MM Tehranipoor - ACM Transactions on Design …, 2017 - dl.acm.org
The Internet of Things (IoT) is transforming the way we live and work by increasing the
connectedness of people and things on a scale that was once unimaginable. However, the …

Physical-layer identification of UHF RFID tags

D Zanetti, B Danev, S ೄapkun - Proceedings of the sixteenth annual …, 2010 - dl.acm.org
In this work, we study physical-layer identification of passive UHF RFID tags. We collect
signals from a population of 70 tags using a purpose-built reader and we analyze time …