A novel blockchain-based product ownership management system (POMS) for anti-counterfeits in the post supply chain

K Toyoda, PT Mathiopoulos, I Sasase, T Ohtsuki - IEEE access, 2017 - ieeexplore.ieee.org
For more than a decade now, radio frequency identification (RFID) technology has been
quite effective in providing anti-counterfeits measures in the supply chain. However, the …

A survey of software clone detection from security perspective

H Zhang, K Sakurai - IEEE Access, 2021 - ieeexplore.ieee.org
For software engineering, if two code fragments are closely similar with minor modifications
or even identical due to a copy-paste behavior, that is called software/code clone. Code …

Enabling IC traceability via blockchain pegged to embedded PUF

MN Islam, S Kundu - ACM Transactions on Design Automation of …, 2019 - dl.acm.org
Globalization of IC supply chain has increased the risk of counterfeit, tampered, and re-
packaged chips in the market. Counterfeit electronics poses a security risk in safety critical …

You can clone but you cannot hide: A survey of clone prevention and detection for RFID

K Bu, M Weng, Y Zheng, B Xiao… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Radio-frequency identification (RFID) is one of the driving technologies for Internet of
Things. The architecture-succinctness and cost-effectiveness of RFID tags promise their …

Deterministic detection of cloning attacks for anonymous RFID systems

K Bu, M Xu, X Liu, J Luo, S Zhang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Cloning attacks seriously impede the security of radio-frequency identification (RFID)
applications. This paper tackles deterministic clone detection for anonymous RFID systems …

Appb: Anti-counterfeiting and privacy-preserving blockchain-based vehicle supply chains

C Zhang, L Zhu, C Xu, K Sharif, R Lu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The vehicle supply chain industry is in a stage of rapid development with the popularization
of electric vehicles. However, counterfeits, also known as fake products, present a non …

ACD: An adaptable approach for RFID cloning attack detection

W Huang, Y Zhang, Y Feng - Sensors, 2020 - mdpi.com
With the rapid development of the internet of things, radio frequency identification (RFID)
technology plays an important role in various fields. However, RFID systems are vulnerable …

Detection of RFID cloning attacks: a spatiotemporal trajectory data stream-based practical approach

Y Feng, W Huang, S Wang, Y Zhang, S Jiang - Computer Networks, 2021 - Elsevier
With the rapid development of the internet of things (IoT), radio frequency identification
(RFID) technology plays an important role in various fields. However, tags are vulnerable to …

A very fast tags polling protocol for single and multiple readers RFID systems, and its applications

MA Bonuccelli, F Martelli - ad hoc networks, 2018 - Elsevier
In this paper, we present a very fast and simple protocol for polling tags in an RFID system
formed by one or more readers, and a multitude of tags. Actually, the protocol is time-optimal …

Enabling IoT authentication, privacy and security via blockchain

MN Islam - 2021 - scholarworks.umass.edu
Although low-power and Internet-connected gadgets and sensors are increasingly
integrated into our lives, the optimal design of these systems remains an issue. In particular …