Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems
暂无分享,去创建一个
Jiguo Yu | Kai Lin | Honglong Chen | Zhibo Wang | Xin Ai | Jiguo Yu | Honglong Chen | Zhibo Wang | Kai Lin | Xin Ai
[1] Bin Xiao,et al. Efficient Physical-Layer Unknown Tag Identification in Large-scale RFID Systems , 2017, IEEE Transactions on Communications.
[2] Jie Wu,et al. Fast Identification of Blocked RFID Tags , 2018, IEEE Transactions on Mobile Computing.
[3] Shigang Chen,et al. Missing-Tag Detection and Energy–Time Tradeoff in Large-Scale RFID Systems With Unreliable Channels , 2014, IEEE/ACM Transactions on Networking.
[4] Murali S. Kodialam,et al. Fast and reliable estimation schemes in RFID systems , 2006, MobiCom '06.
[5] Hairong Qi,et al. Cost-effective barrier coverage formation in heterogeneous wireless sensor networks , 2017, Ad Hoc Networks.
[6] Keqiu Li,et al. Time- and Energy-Efficient Detection of Unknown Tags in Large-Scale RFID Systems , 2013, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems.
[7] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[8] Tony Q. S. Quek,et al. Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions , 2018, IEEE Transactions on Information Forensics and Security.
[9] Feng Xia,et al. Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems , 2018, IEEE Internet of Things Journal.
[10] Feng Xia,et al. Mobility Dataset Generation for Vehicular Social Networks Based on Floating Car Data , 2018, IEEE Transactions on Vehicular Technology.
[11] Alex X. Liu,et al. Every bit counts: fast and scalable RFID estimation , 2012, Mobicom '12.
[12] Bo Sheng,et al. Efficient techniques for monitoring missing RFID tags , 2010, IEEE Transactions on Wireless Communications.
[13] Qian Wang,et al. Task-Bundling-Based Incentive for Location-Dependent Mobile Crowdsourcing , 2019, IEEE Communications Magazine.
[14] Feng Xia,et al. On Achieving Asynchronous Energy-Efficient Neighbor Discovery for Mobile Sensor Networks , 2018, IEEE Transactions on Emerging Topics in Computing.
[15] Rui Zhang,et al. Fast identification of the missing tags in a large RFID system , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[16] Chong Wang,et al. RFID-Based 3-D Positioning Schemes , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[17] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[18] Srdjan Capkun,et al. Physical-layer identification of UHF RFID tags , 2010, MobiCom.
[19] Honglong Chen,et al. Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems With Unknown Tags , 2017, IEEE Internet of Things Journal.
[20] Jorge Munilla,et al. HB-MP: A further step in the HB-family of lightweight authentication protocols , 2007, Comput. Networks.
[21] Kai Bu,et al. Approaching the time lower bound on cloned-tag identification for large RFID systems , 2014, Ad Hoc Networks.
[22] A.R. Harish,et al. Analysis of low range Indoor Location Tracking techniques using Passive UHF RFID tags , 2008, 2008 IEEE Radio and Wireless Symposium.
[23] Jie Wu,et al. RFID Estimation With Blocker Tags , 2017, IEEE/ACM Transactions on Networking.
[24] Rabab Kreidieh Ward,et al. Probabilistic Analysis of Blocking Attack in RFID Systems , 2011, IEEE Transactions on Information Forensics and Security.
[25] Sherali Zeadally,et al. An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography , 2015, IEEE Internet of Things Journal.
[26] Lei Yang,et al. Season: Shelving interference and joint identification in large-scale RFID systems , 2011, 2011 Proceedings IEEE INFOCOM.
[27] Shigang Chen,et al. Efficient Protocols for Identifying the Missing Tags in a Large RFID System , 2013, IEEE/ACM Transactions on Networking.
[28] S. Devadas,et al. Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.
[29] Yuguang Fang,et al. An Efficient Tag Search Protocol in Large-Scale RFID Systems With Noisy Channel , 2013, IEEE/ACM Transactions on Networking.
[30] Hung-Yu Chien,et al. SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity , 2007, IEEE Transactions on Dependable and Secure Computing.
[31] Lei Yang,et al. Tash: Toward Selective Reading as Hash Primitives for Gen2 RFIDs , 2019, IEEE/ACM Transactions on Networking.
[32] Weiping Zhu,et al. Accurate and Efficient Object Tracking Based on Passive RFID , 2015, IEEE Transactions on Mobile Computing.
[33] Shigeng Zhang,et al. Deterministic Detection of Cloning Attacks for Anonymous RFID Systems , 2015, IEEE Transactions on Industrial Informatics.
[34] Hairong Qi,et al. Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server , 2019, IEEE Transactions on Mobile Computing.
[35] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[36] Jiangchuan Liu,et al. Efficient Unknown Tag Detection in Large-Scale RFID Systems With Unreliable Channels , 2017, IEEE/ACM Transactions on Networking.
[37] Da-Zhi Sun,et al. A hash-based RFID security protocol for strong privacy protection , 2012, IEEE Transactions on Consumer Electronics.
[38] Xiaohu Tang,et al. A Time-Efficient Pair-Wise Collision-Resolving Protocol for Missing Tag Identification , 2017, IEEE Transactions on Communications.
[39] Lu Liu,et al. Segmented Bloom Filter Based Missing Tag Detection for Large-Scale RFID Systems With Unknown Tags , 2018, IEEE Access.
[40] Jiguo Yu,et al. MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems , 2018, IEEE Transactions on Vehicular Technology.
[41] Kai Bu,et al. Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems , 2013, IEEE Transactions on Information Forensics and Security.
[42] Xiang Li,et al. DTD: A Novel Double-Track Approach to Clone Detection for RFID-Enabled Supply Chains , 2017, IEEE Transactions on Emerging Topics in Computing.
[43] Hairong Qi,et al. Achieving location error tolerant barrier coverage for wireless sensor networks , 2017, Comput. Networks.
[44] Jiguo Yu,et al. RMTS: A robust clock synchronization scheme for wireless sensor networks , 2019, J. Netw. Comput. Appl..
[45] Wei Gong,et al. Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems , 2017, Secur. Commun. Networks.
[46] Lei Yang,et al. Analog On-Tag Hashing: Towards Selective Reading as Hash Primitives in Gen2 RFID Systems , 2017, MobiCom.
[47] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.