A RFID architecture framework for global supply chain applications
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
Comprehensive protection of RFID traceability information systems using aggregate signatures
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Concurrency and Computation: Practice & Experience
SQLIA detection and prevention approach for RFID systems
Journal of Systems and Software
Hi-index | 0.00 |
In its current form, RFID system are susceptible to a range of malevolent attacks. With the rich business intelligence that RFID infrastructure could possibly carry, security is of paramount importance. In this paper, we formalise various threat models due tag cloning on the RFID system. We also present a simple but efficient and cost effect technique that strengthens the resistance of RFID tags to cloning attacks. Our techniques can even strengthen tags against cloning in environments with untrusted reading devices.