Chipless RFID Physical Layer Security With MIMO-Based Multi-Dimensional Data Points for Internet of Things

S Khan, B Ray, N Karmakar - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
This article introduces a novel approach to address the security challenges of chipless tag
systems in the context of Internet of Things (IoT) applications. The proposed technique …

Physical-layer detection and security of printed chipless RFID tag for internet of things applications

G Khadka, B Ray, NC Karmakar… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
This article has proposed detection and physical-layer security provision for printed sensory
tag systems for Internet of Things (IoT) applications. The printed sensory tags can be a very …

Reverse engineering and security evaluation of commercial tags for RFID-based IoT applications

TM Fernández-Caramés, P Fraga-Lamas… - Sensors, 2016 - mdpi.com
The Internet of Things (IoT) is a distributed system of physical objects that requires the
seamless integration of hardware (eg, sensors, actuators, electronics) and network …

Combating tag cloning with COTS RFID devices

X Chen, J Liu, X Wang, X Zhang… - 2018 15th Annual …, 2018 - ieeexplore.ieee.org
In RFID systems, a cloning attack is to fabricate one or more replicas of a genuine tag, so
that these replicas behave exactly the same as the genuine tag and fool the reader for …

ACD: An adaptable approach for RFID cloning attack detection

W Huang, Y Zhang, Y Feng - Sensors, 2020 - mdpi.com
With the rapid development of the internet of things, radio frequency identification (RFID)
technology plays an important role in various fields. However, RFID systems are vulnerable …

A machine learning approach-based chipless RFID system for robust detection in real-world implementations

S Jeong, J Hester, R Bahr… - 2021 IEEE MTT-S …, 2021 - ieeexplore.ieee.org
This work describes a novel method based on a machine learning (ML) approach for highly
accurate and robust identification of chipless RFID applications in realistic environments. For …

You can clone but you cannot hide: A survey of clone prevention and detection for RFID

K Bu, M Weng, Y Zheng, B Xiao… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Radio-frequency identification (RFID) is one of the driving technologies for Internet of
Things. The architecture-succinctness and cost-effectiveness of RFID tags promise their …

Clone tag detection in distributed RFID systems

H Kamaludin, H Mahdin, JH Abawajy - PloS one, 2018 - journals.plos.org
Although Radio Frequency Identification (RFID) is poised to displace barcodes, security
vulnerabilities pose serious challenges for global adoption of the RFID technology …

Rcid: Fingerprinting passive rfid tags via wideband backscatter

J Li, A Li, D Han, Y Zhang, T Li… - IEEE INFOCOM 2022 …, 2022 - ieeexplore.ieee.org
Tag cloning and spoofing pose great challenges to RFID applications. This paper presents
the design and evaluation of RCID, a novel system to fingerprint RFID tags based on the …

Statistical Analysis Based Feature Selection Enhanced RF-PUF With 99.8% Accuracy on Unmodified Commodity Transmitters for IoT Physical Security

MF Bari, P Agrawal, B Chatterjee, S Sen - Frontiers in Electronics, 2022 - frontiersin.org
Due to the diverse and mobile nature of the deployment environment, smart commodity
devices are vulnerable to various spoofing attacks which can allow a rogue device to get …