Eingerprint: Robust Energy-related Fingerprinting for Passive RFID Tags
暂无分享,去创建一个
Dong Jiang | Xia Wang | Xingyu Chen | Jia Liu | Haisong Liu | Lijun Chen | Lijun Chen | Dong Jiang | Jia Liu | Xingyu Chen | Xia Wang | Haisong Liu
[1] Sang-Soo Yeo,et al. Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value , 2011, Comput. Commun..
[2] Yunhao Liu,et al. Scalable Data Access Control in RFID-Enabled Supply Chain , 2014, 2014 IEEE 22nd International Conference on Network Protocols.
[3] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[4] Jizhong Zhao,et al. GenePrint: Generic and accurate physical-layer identification for UHF RFID tags , 2013, 2013 21st IEEE International Conference on Network Protocols (ICNP).
[5] Jitendra K. Tugnait,et al. A channel-based hypothesis testing approach to enhance user authentication in wireless networks , 2010, 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010).
[6] Dennis Goeckel,et al. Identifying Wireless Users via Transmitter Imperfections , 2011, IEEE Journal on Selected Areas in Communications.
[7] Longfei Shangguan,et al. The Design and Implementation of a Mobile RFID Tag Sorting Robot , 2016, MobiSys.
[8] Xia Wang,et al. On Improving Write Throughput in Commodity RFID Systems , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.
[9] Omid Salehi-Abari,et al. Are RFID Sensing Systems Ready for the Real World? , 2019, MobiSys.
[10] Xinyu Zhang,et al. Tracking orientation of batteryless internet-of-things using RFID tags: demo , 2016, MobiCom.
[11] Jiming Chen,et al. RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations , 2009 .
[12] Srdjan Capkun,et al. Physical-layer identification of UHF RFID tags , 2010, MobiCom.
[13] Lei Yang,et al. Anti-counterfeiting via federated RFID tags' fingerprints and geometric relationships , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[14] Jiannong Cao,et al. Fast RFID Sensory Data Collection: Trade-off Between Computation and Communication Costs , 2019, IEEE/ACM Transactions on Networking.
[15] Sachin Katti,et al. WiDeo: Fine-grained Device-free Motion Tracing using RF Backscatter , 2015, NSDI.
[16] Shahram Khazaei,et al. Breaking anonymity of some recent lightweight RFID authentication protocols , 2019, Wirel. Networks.
[17] Min Chen,et al. ETAP: Enable Lightweight Anonymous RFID Authentication with O(1) Overhead , 2015, 2015 IEEE 23rd International Conference on Network Protocols (ICNP).
[18] Wondimu K. Zegeye,et al. WiFi RSS fingerprinting indoor localization for mobile devices , 2016, 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON).
[19] Kui Ren,et al. Wireless Physical-Layer Identification: Modeling and Validation , 2015, IEEE Transactions on Information Forensics and Security.
[20] Jia Di,et al. Fingerprinting RFID Tags , 2011, IEEE Transactions on Dependable and Secure Computing.
[21] Sanglu Lu,et al. Spin-Antenna: 3D Motion Tracking for Tag Array Labeled Objects via Spinning Antenna , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.
[22] Lin Chen,et al. Fast and Reliable Tag Search in Large-Scale RFID Systems: A Probabilistic Tree-based Approach , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[23] Jingyu Hua,et al. Accurate and Efficient Wireless Device Fingerprinting Using Channel State Information , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[24] Yunhao Liu,et al. Relative Localization of RFID Tags using Spatial-Temporal Phase Profiling , 2015, NSDI.
[25] Maode Ma,et al. An ultralightweight RFID authentication protocol with CRC and permutation , 2014, J. Netw. Comput. Appl..
[26] Srdjan Capkun,et al. On the Practicality of UHF RFID Fingerprinting: How Real is the RFID Tracking Problem? , 2011, PETS.
[27] Lei Yang,et al. Identification-free batch authentication for RFID tags , 2010, The 18th IEEE International Conference on Network Protocols.
[28] Xin Li,et al. Butterfly: Environment-Independent Physical-Layer Authentication for Passive RFID , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[29] Lei Hu,et al. Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[30] Zhi Sun,et al. FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.
[31] T.J. Brazil,et al. Behavioral modeling of RF power amplifiers based on pruned volterra series , 2004, IEEE Microwave and Wireless Components Letters.
[32] Shigeng Zhang,et al. Let's work together: Fast tag identification by interference elimination for multiple RFID readers , 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP).