Data on Air: Organization and Access
IEEE Transactions on Knowledge and Data Engineering
Identification Tokens - or: Solving the Chess Grandmaster Problem
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
ALOHA packet system with and without slots and capture
ACM SIGCOMM Computer Communication Review
Strengthening EPC tags against cloning
Proceedings of the 4th ACM workshop on Wireless security
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
An RFID Distance Bounding Protocol
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Adaptive splitting protocols for RFID tag collision arbitration
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Fast and reliable estimation schemes in RFID systems
Proceedings of the 12th annual international conference on Mobile computing and networking
Physically Unclonable Function-Based Security and Privacy in RFID Systems
PERCOM '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
Finding popular categories for RFID tags
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
RFID-based supply chain partner authentication and key agreement
Proceedings of the second ACM conference on Wireless network security
Securing RFID Systems by Detecting Tag Cloning
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Short survey: Taxonomy and survey of RFID anti-collision protocols
Computer Communications
A hybrid network coding technique for single-hop wireless networks
IEEE Journal on Selected Areas in Communications - Special issue on network coding for wireless communication networks
Enhancing RFID Tag Resistance against Cloning Attack
NSS '09 Proceedings of the 2009 Third International Conference on Network and System Security
Refresh: weak privacy model for RFID systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
Identifying the missing tags in a large RFID system
Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing
Shortest path computation on air indexes
Proceedings of the VLDB Endowment
Energy harvesting active networked tags (EnHANTs) for ubiquitous object networking
IEEE Wireless Communications
A framework for analyzing RFID distance bounding protocols
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
They can hear your heartbeats: non-invasive security for implantable medical devices
Proceedings of the ACM SIGCOMM 2011 conference
Energy-efficient polling protocols in RFID systems
MobiHoc '11 Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing
Fast tag searching protocol for large-scale RFID systems
ICNP '11 Proceedings of the 2011 19th IEEE International Conference on Network Protocols
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Fast cloned-tag identification protocols for large-scale RFID systems
Proceedings of the 2012 IEEE 20th International Workshop on Quality of Service
PUF-enhanced offline RFID security and privacy
Journal of Network and Computer Applications
Complete and fast unknown tag identification in large RFID systems
MASS '12 Proceedings of the 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS)
RASPberry: A stable reader activation scheduling protocol in multi-reader RFID systems
ICNP '09 Proceedings of the 2009 17th IEEE International Conference on Network Protocols. ICNP 2009
IEEE Transactions on Parallel and Distributed Systems
Hi-index | 0.00 |
Tag cloning attacks threaten a variety of Radio Frequency Identification (RFID) applications but are hard to prevent. To secure RFID applications that confine tagged objects in the same RFID system, this paper studies the cloned-tag identification problem. Although limited existing work has shed some light on the problem, designing fast cloned-tag identification protocols for applications in large-scale RFID systems is yet not thoroughly investigated. To this end, we propose leveraging broadcast and collisions to identify cloned tags. This approach relieves us from resorting to complex cryptography techniques and time-consuming transmission of tag IDs. Based on this approach, we derive a time lower bound on cloned-tag identification and propose a suite of time-efficient protocols toward approaching the time lower bound. The execution time of our protocol is only 1.4 times the value of the time lower bound, being over 91% less than that of the existing protocol. Even better, we further dig up an adaptive protocol that can yield higher time efficiency under some scenarios. The proposed protocols may benefit also RFID applications that distribute tagged objects across multiple places.