Lightweight mutual authentication and ownership transfer for RFID systems

L Kulseng, Z Yu, Y Wei, Y Guan - 2010 proceedings IEEE …, 2010 - ieeexplore.ieee.org
The promise of RFID technology has been evidently foreseeable due to the low cost and
high convenience value of RFID tags. However, the low-cost RFID tags poses new …

Fast tag searching protocol for large-scale RFID systems

Y Zheng, M Li - IEEE/ACM Transactions On Networking, 2012 - ieeexplore.ieee.org
Fast searching a particular subset in a large number of products attached with radio
frequency identification (RFID) tags is of practical importance for a variety of applications, but …

How to monitor for missing RFID tags

CC Tan, B Sheng, Q Li - 2008 The 28th International …, 2008 - ieeexplore.ieee.org
As RFID tags become more widespread, new approaches for managing larger numbers of
RFID tags will be needed. In this paper, we consider the problem of how to accurately and …

RFID in pervasive computing: State-of-the-art and outlook

G Roussos, V Kostakos - Pervasive and Mobile Computing, 2009 - Elsevier
rfid has already found its way into a variety of large scale applications and arguably it is
already one of the most successful technologies in the history of computing. Beyond doubt …

PET: Probabilistic estimating tree for large-scale RFID estimation

Y Zheng, M Li - IEEE Transactions on Mobile Computing, 2011 - ieeexplore.ieee.org
Estimating the number of RFID tags in the region of interest is an important task in many
RFID applications. In this paper, we propose a novel approach for efficiently estimating the …

Privacy of recent RFID authentication protocols

K Ouafi, RCW Phan - Information Security Practice and Experience: 4th …, 2008 - Springer
Privacy is a major concern in RFID systems, especially with widespread deployment of
wireless-enabled interconnected personal devices eg PDAs and mobile phones, credit …

Provably secure grouping-proofs for RFID tags

M Burmester, B de Medeiros, R Motta - International Conference on Smart …, 2008 - Springer
We investigate an application of RFIDs referred to in the literature as group scanning, in
which several tags are “simultaneously” scanned by a reader device. Our goal is to study the …

[图书][B] Security in RFID and sensor networks

P Kitsos - 2016 - taylorfrancis.com
In the past several years, there has been an increasing trend in the use of Radio Frequency
Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of …

Secure attribute-based search in RFID-based inventory control systems

R Doss, R Trujillo-Rasua, S Piramuthu - Decision Support Systems, 2020 - Elsevier
We develop a secure attribute-based search protocol for Radio Frequency Identification
(RFID) systems. This protocol can be used to simultaneously identify groups of items that …

A Gen2-based RFID authentication protocol for security and privacy

HM Sun, WC Ting - IEEE Transactions on Mobile Computing, 2008 - ieeexplore.ieee.org
EPCglobal Class-1 Generation-2 specification (Gen2 in brief) has been approved as
ISO18000-6C for global use, but the identity of tag (TID) is transmitted in plaintext which …