[go: up one dir, main page]

Ai et al., 2020 - Google Patents

Nowhere to hide: Efficiently identifying probabilistic cloning attacks in large-scale RFID systems

Ai et al., 2020

View PDF
Document ID
16228652330062799955
Author
Ai X
Chen H
Lin K
Wang Z
Yu J
Publication year
Publication venue
IEEE Transactions on Information Forensics and Security

External Links

Snippet

Radio-Frequency Identification (RFID) is an emerging technology which has been widely applied in various scenarios, such as tracking, object monitoring, and social networks, etc. Cloning attacks can severely disturb the RFID systems, such as missed detection for the …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10019Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers.
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Ai et al. Nowhere to hide: Efficiently identifying probabilistic cloning attacks in large-scale RFID systems
Xie et al. Managing RFID data: Challenges, opportunities and solutions
Chen et al. Efficiently and completely identifying missing key tags for anonymous RFID systems
Sun et al. A hash-based RFID security protocol for strong privacy protection
Liu et al. Fast and accurate detection of unknown tags for RFID systems–hash collisions are desirable
Shahzad et al. Expecting the unexpected: Fast and reliable detection of missing RFID tags in the wild
Gong et al. Fast and scalable counterfeits estimation for large-scale RFID systems
Liu et al. Generic composite counting in RFID systems
Su et al. An efficient missing tag identification approach in RFID collisions
Alagheband et al. Simulation-based traceability analysis of RFID authentication protocols
Chen et al. Probabilistic detection of missing tags for anonymous multicategory RFID systems
Chen et al. MAC: Missing tag iceberg queries for multi-category RFID systems
Chen et al. RFID technologies for internet of things
Chen et al. DAP: Efficient detection against probabilistic cloning attacks in anonymous RFID systems
Chen et al. ETAP: Enable lightweight anonymous RFID authentication with O (1) overhead
Rahman et al. Efficient detection of counterfeit products in large-scale RFID systems using batch authentication protocols
Xie et al. Implementation of differential tag sampling for COTS RFID systems
Cui et al. LH-IDS: Lightweight hybrid intrusion detection system based on differential privacy in VANETs
Yang et al. Physical layer authentication in backscatter communication: a review
Liu et al. Fast and accurate missing tag detection for multi-category RFID systems
Xie et al. Efficient integrity authentication scheme for large-scale RFID systems
Xie et al. A tag-correlation-based approach to fast identification of group tags
Xie et al. A lightweight integrity authentication approach for RFID-enabled supply chains
Su et al. Unknown tag identification protocol based on collision slot resolution in large-scale and battery-less RFID system
Yin et al. Efficient Missing Key Tag Identification in Large-scale RFID Systems: An Iterative Verification and Selection Method