Ai et al., 2020 - Google Patents
Nowhere to hide: Efficiently identifying probabilistic cloning attacks in large-scale RFID systemsAi et al., 2020
View PDF- Document ID
- 16228652330062799955
- Author
- Ai X
- Chen H
- Lin K
- Wang Z
- Yu J
- Publication year
- Publication venue
- IEEE Transactions on Information Forensics and Security
External Links
Snippet
Radio-Frequency Identification (RFID) is an emerging technology which has been widely applied in various scenarios, such as tracking, object monitoring, and social networks, etc. Cloning attacks can severely disturb the RFID systems, such as missed detection for the …
- 238000010367 cloning 0 title abstract description 70
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10019—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers.
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ai et al. | Nowhere to hide: Efficiently identifying probabilistic cloning attacks in large-scale RFID systems | |
Xie et al. | Managing RFID data: Challenges, opportunities and solutions | |
Chen et al. | Efficiently and completely identifying missing key tags for anonymous RFID systems | |
Sun et al. | A hash-based RFID security protocol for strong privacy protection | |
Liu et al. | Fast and accurate detection of unknown tags for RFID systems–hash collisions are desirable | |
Shahzad et al. | Expecting the unexpected: Fast and reliable detection of missing RFID tags in the wild | |
Gong et al. | Fast and scalable counterfeits estimation for large-scale RFID systems | |
Liu et al. | Generic composite counting in RFID systems | |
Su et al. | An efficient missing tag identification approach in RFID collisions | |
Alagheband et al. | Simulation-based traceability analysis of RFID authentication protocols | |
Chen et al. | Probabilistic detection of missing tags for anonymous multicategory RFID systems | |
Chen et al. | MAC: Missing tag iceberg queries for multi-category RFID systems | |
Chen et al. | RFID technologies for internet of things | |
Chen et al. | DAP: Efficient detection against probabilistic cloning attacks in anonymous RFID systems | |
Chen et al. | ETAP: Enable lightweight anonymous RFID authentication with O (1) overhead | |
Rahman et al. | Efficient detection of counterfeit products in large-scale RFID systems using batch authentication protocols | |
Xie et al. | Implementation of differential tag sampling for COTS RFID systems | |
Cui et al. | LH-IDS: Lightweight hybrid intrusion detection system based on differential privacy in VANETs | |
Yang et al. | Physical layer authentication in backscatter communication: a review | |
Liu et al. | Fast and accurate missing tag detection for multi-category RFID systems | |
Xie et al. | Efficient integrity authentication scheme for large-scale RFID systems | |
Xie et al. | A tag-correlation-based approach to fast identification of group tags | |
Xie et al. | A lightweight integrity authentication approach for RFID-enabled supply chains | |
Su et al. | Unknown tag identification protocol based on collision slot resolution in large-scale and battery-less RFID system | |
Yin et al. | Efficient Missing Key Tag Identification in Large-scale RFID Systems: An Iterative Verification and Selection Method |