RFID applications and security review

C Munoz-Ausecha, J Ruiz-Rosero… - Computation, 2021 - mdpi.com
Radio frequency identification (RFID) is widely used in several contexts, such as logistics,
supply chains, asset tracking, and health, among others, therefore drawing the attention of …

Physical-layer detection and security of printed chipless RFID tag for internet of things applications

G Khadka, B Ray, NC Karmakar… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
This article has proposed detection and physical-layer security provision for printed sensory
tag systems for Internet of Things (IoT) applications. The printed sensory tags can be a very …

Refseer: A citation recommendation system

W Huang, Z Wu, P Mitra, CL Giles - IEEE/ACM joint conference …, 2014 - ieeexplore.ieee.org
Citations are important in academic dissemination. To help researchers check the
completeness of citations while authoring a paper, we introduce a citation recommendation …

Single RFID tag ownership transfer protocols

G Kapoor, S Piramuthu - IEEE Transactions on Systems, Man …, 2010 - ieeexplore.ieee.org
Security/privacy issues are of paramount importance for widespread acceptance and use of
radio-frequency identification (RFID) tags. Over the last few years, researchers have …

A novel RFID-based anti-counterfeiting scheme for retail environments

G Khalil, R Doss, M Chowdhury - IEEE Access, 2020 - ieeexplore.ieee.org
Product counterfeiting and theft are on-going problems in supply chains and retail
environments, but not a lot of work has been done to address these problems through the …

Secure RFID tag ownership transfer based on quadratic residues

R Doss, W Zhou, S Yu - IEEE Transactions on Information …, 2012 - ieeexplore.ieee.org
In this paper, we propose a novel approach to secure ownership transfer in RFID systems
based on the quadratic residue property. We present two secure ownership transfer …

Multi-tag and multi-owner RFID ownership transfer in supply chains

G Kapoor, W Zhou, S Piramuthu - Decision Support Systems, 2011 - Elsevier
In any supply chain, there is a high likelihood for individual objects to change ownership at
least once in their lifetime. As RFID tags enter the supply chain, these RFID-tagged objects …

Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy

S Sundaresan, R Doss, W Zhou, S Piramuthu - Computer Communications, 2015 - Elsevier
In this paper we propose a secure ownership transfer protocol for a multi-tag multi-owner
RFID environment that provides individual-owner-privacy. To our knowledge, the existing …

Vulnerabilities in some recently proposed RFID ownership transfer protocols

G Kapoor, S Piramuthu - 2009 First International Conference on …, 2009 - ieeexplore.ieee.org
Authentication of RFID tags is commonly achieved through cryptographic means with
protocols that encrypt communication between the parties of interest. There is an extensive …

Lightweight security protocol for chipless RFID in Internet of Things (IoT) applications

V Sharma, A Vithalkar, M Hashmi - 2018 10th International …, 2018 - ieeexplore.ieee.org
The RFID based communication between objects within the framework of IoT is potentially
very efficient in terms of power requirements and system complexity. The new design …