4.7 Article

Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server

Zhibo Wang et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2019)

Article Engineering, Electrical & Electronic

Task-Bundling-Based Incentive for Location-Dependent Mobile Crowdsourcing

Zhibo Wang et al.

IEEE COMMUNICATIONS MAGAZINE (2019)

Article Computer Science, Hardware & Architecture

Tash: Toward Selective Reading as Hash Primitives for Gen2 RFIDs

Qiongzheng Lin et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2019)

Article Computer Science, Hardware & Architecture

RMTS: A robust clock synchronization scheme for wireless sensor networks

Xuxin Zhang et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Information Systems

On Achieving Asynchronous Energy-Efficient Neighbor Discovery for Mobile Sensor Networks

Honglong Chen et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2018)

Article Computer Science, Information Systems

Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems

Honglong Chen et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Theory & Methods

Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions

Prosanta Gope et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

Fast Identification of Blocked RFID Tags

Xiulong Liu et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2018)

Article Engineering, Electrical & Electronic

Mobility Dataset Generation for Vehicular Social Networks Based on Floating Car Data

Xiangjie Kong et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Engineering, Electrical & Electronic

MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems

Honglong Chen et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Computer Science, Information Systems

Segmented Bloom Filter Based Missing Tag Detection for Large-Scale RFID Systems With Unknown Tags

Kai Lin et al.

IEEE ACCESS (2018)

Article Engineering, Electrical & Electronic

Efficient Physical-Layer Unknown Tag Identification in Large-scale RFID Systems

Feng Zhu et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2017)

Article Engineering, Electrical & Electronic

A Time-Efficient Pair-Wise Collision-Resolving Protocol for Missing Tag Identification

Lijuan Zhang et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2017)

Article Computer Science, Hardware & Architecture

Efficient Unknown Tag Detection in Large-Scale RFID Systems With Unreliable Channels

Wei Gong et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2017)

Article Computer Science, Hardware & Architecture

RFID Estimation With Blocker Tags

Xiulong Liu et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2017)

Article Computer Science, Information Systems

Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems

Ju-min Zhao et al.

SECURITY AND COMMUNICATION NETWORKS (2017)

Article Computer Science, Information Systems

Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems With Unknown Tags

Honglong Chen et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Information Systems

DTD: A Novel Double-Track Approach to Clone Detection for RFID-Enabled Supply Chains

Jun Huang et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2017)

Article Computer Science, Information Systems

Cost-effective barrier coverage formation in heterogeneous wireless sensor networks

Zhibo Wang et al.

AD HOC NETWORKS (2017)

Article Computer Science, Hardware & Architecture

Achieving location error tolerant barrier coverage for wireless sensor networks

Zhibo Wang et al.

COMPUTER NETWORKS (2017)

Article Computer Science, Hardware & Architecture

An Efficient Tag Search Protocol in Large-Scale RFID Systems With Noisy Channel

Min Chen et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2016)

Article Computer Science, Information Systems

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

Ala Al-Fuqaha et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)

Article Automation & Control Systems

Deterministic Detection of Cloning Attacks for Anonymous RFID Systems

Kai Bu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2015)

Article Computer Science, Information Systems

Accurate and Efficient Object Tracking Based on Passive RFID

Lei Yang et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2015)

Article Computer Science, Information Systems

An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography

Debiao He et al.

IEEE INTERNET OF THINGS JOURNAL (2015)

Article Computer Science, Information Systems

Approaching the time lower bound on cloned-tag identification for large RFID systems

Kai Bu et al.

AD HOC NETWORKS (2014)

Article Computer Science, Theory & Methods

Fault-Tolerant RFID Reader Localization Based on Passive RFID Tags

Weiping Zhu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Hardware & Architecture

Missing-Tag Detection and Energy-Time Tradeoff in Large-Scale RFID Systems With Unreliable Channels

Wen Luo et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2014)

Article Computer Science, Theory & Methods

Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems

Kai Bu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Computer Science, Hardware & Architecture

Efficient Protocols for Identifying the Missing Tags in a Large RFID System

Tao Li et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2013)

Proceedings Paper Computer Science, Hardware & Architecture

Time- and Energy-efficient Detection of Unknown Tags in Large-scale RFID Systems

Xiulong Liu et al.

2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013) (2013)

Article Engineering, Electrical & Electronic

A Hash-Based RFID Security Protocol for Strong Privacy Protection

Da-Zhi Sun et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2012)

Article Computer Science, Theory & Methods

Probabilistic Analysis of Blocking Attack in RFID Systems

Ehsan Vahedi et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)

Article Engineering, Electrical & Electronic

Efficient Techniques for Monitoring Missing RFID Tags

Chiu C. Tan et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2010)

Article Computer Science, Hardware & Architecture

SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity

Hung-Yu Chien

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2007)

Article Computer Science, Hardware & Architecture

HB-MP: A further step in the HB-family of lightweight authentication protocols

J. Munilla et al.

COMPUTER NETWORKS (2007)

Article Engineering, Electrical & Electronic

RFID security and privacy: A research survey

A Juels

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2006)