Cargando…
Clone tag detection in distributed RFID systems
Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in...
Autores principales: | Kamaludin, Hazalila, Mahdin, Hairulnizam, Abawajy, Jemal H. |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2018
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5863942/ https://www.ncbi.nlm.nih.gov/pubmed/29565982 http://dx.doi.org/10.1371/journal.pone.0193951 |
Ejemplares similares
-
An Approach for Removing Redundant Data from RFID Data Streams
por: Mahdin, Hairulnizam, et al.
Publicado: (2011) -
Optimal Detection Range of RFID Tag for RFID-based Positioning System Using the k-NN Algorithm
por: Han, Soohee, et al.
Publicado: (2009) -
Robust RFID Tag Identification
por: Benedetti, David, et al.
Publicado: (2022) -
ACD: An Adaptable Approach for RFID Cloning Attack Detection
por: Huang, Weiqing, et al.
Publicado: (2020) -
Influence of the Distribution of Tag IDs on RFID Memoryless Anti-Collision Protocols
por: Cmiljanic, Nikola, et al.
Publicado: (2017)