X Chen, J Liu, X Wang, X Zhang… - 2018 15th Annual …, 2018 - ieeexplore.ieee.org
In RFID systems, a cloning attack is to fabricate one or more replicas of a genuine tag, so
that these replicas behave exactly the same as the genuine tag and fool the reader for …