Deterministic detection of cloning attacks for anonymous RFID systems

K Bu, M Xu, X Liu, J Luo, S Zhang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Cloning attacks seriously impede the security of radio-frequency identification (RFID)
applications. This paper tackles deterministic clone detection for anonymous RFID systems …

Double polling-based tag information collection for sensor-augmented RFID systems

K Lin, H Chen, N Yan, Z Ni, Z Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The significance of RFID-based information collection is becoming increasingly visible as
more and more sensor-augmented RFID systems are deployed. Tag information collection …

Fast and reliable missing tag detection for multiple-group RFID systems

K Lin, H Chen, N Yan, Z Li, J Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Radio frequency identification (RFID) technology has been deployed in various scenarios in
recent years. In some practical RFID applications, the items attached with tags can be …

Revisiting RFID missing tag identification

K Liu, L Chen, J Huang, S Liu… - IEEE INFOCOM 2022-IEEE …, 2022 - ieeexplore.ieee.org
We revisit the problem of missing tag identification in RFID networks by making three
contributions. Firstly, we quantitatively compare and gauge the existing propositions …

Efficiently and completely identifying missing key tags for anonymous RFID systems

H Chen, Z Wang, F Xia, Y Li… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
Radio frequency identification (RFID) systems can be applied to efficiently identify the
missing items by attaching them with tags. Prior missing tag identification protocols …

PSR: A novel high-efficiency and easy-to-implement parallel algorithm for anticollision in RFID systems

H Guo, C He, N Wang, M Bolic - IEEE Transactions on Industrial …, 2016 - ieeexplore.ieee.org
Tag anticollision is critical to the performance of many radio frequency identification systems
in industrial applications. Tree-based schemes are popular arbitration algorithms for tag …

The SARFID technique for discriminating tagged items moving through a UHF-RFID gate

A Buffi, P Nepa - IEEE Sensors Journal, 2017 - ieeexplore.ieee.org
The discrimination of tagged items moving along a conveyor belt from other tagged items
that are present in the scenario is investigated, when a UHF-RFID gate is installed at a …

EUMD: Efficient slot utilization based missing tag detection with unknown tags

K Lin, H Chen, X Ai, V Shakhov, L Ni, J Yu… - Journal of Network and …, 2020 - Elsevier
Radio frequency identification (RFID) technology, which obtained significant development in
the past several decades, is widely applied in numerous industrial applications. One of the …

A time-efficient pair-wise collision-resolving protocol for missing tag identification

L Zhang, W Xiang, I Atkinson… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Radio frequency identification (RFID) technology has been employed in wide-raging
application domains. In most RFID applications, time-efficient identification of missing tags is …

Multisource wireless energy harvesting-based medium access control for rechargeable sensors

C Shao, H Roh, T Kim, W Lee - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
By collecting data from sensor devices, wireless sensor networks enable consumer product
management in indoor environments. However, most off-the-shelf sensor devices are battery …