J Xu, X Zhao, A Bakshi… - 2022 IEEE Conference on …, 2022 - ieeexplore.ieee.org
In recent years, many low-cost identification systems have been proposed using RFID tags. Due to their limited compu-tational capability, passive RFID tags cannot provide secure links …
J Gao, H Fan, Y Zhao, Y Shi - Entropy, 2023 - mdpi.com
With the increasing demand for Internet of Things (IoT) network applications, the lack of adequate identification and authentication has become a significant security concern. Radio …
As IoT technologies mature, they are increasingly finding their way into more sensitive domains, such as Medical and Industrial IoT, in which safety and cyber-security are of great …
S Dey, NC Karmakar - 2017 IEEE Region 10 Humanitarian …, 2017 - ieeexplore.ieee.org
This paper demonstrates the study and design of a compact and inexpensive chipless RFID tag with increased data capacity on flexible substrates like plastic or paper. Along with the …
Transmitter authentication is critical for secured Internet of Things (IoT) applications. Recently, there has been growing interest in utilizing the physical layer authentication …
With the rapid growth in wireless communication and IoT technologies, Radio Frequency Identification (RFID) is applied to the Internet of Vehicles (IoV) to ensure the security of …
Fifth generation (5G) network and beyond envision massive Internet of Things (IoT) rollout to support disruptive applications such as extended reality (XR), augmented/virtual reality …
M Lehtonen, D Ostojic, A Ilic, F Michahelles - Pervasive Computing: 7th …, 2009 - Springer
Cloning of RFID tags can lead to financil losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The security …
Radio frequency (RF) fingerprinting is a tool which allows for authentication by utilizing distinct and random distortions in a received signal based on characteristics of the …