2015
DOI: 10.1109/tii.2015.2482921
|View full text |Cite
|
Sign up to set email alerts
|

Deterministic Detection of Cloning Attacks for Anonymous RFID Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
15
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 41 publications
(15 citation statements)
references
References 26 publications
0
15
0
Order By: Relevance
“…We propose a dual verification strategy that combines consistent dual hash collisions with tag reading frequency aggregated over time intervals to verify which of the suspicious tags is genuine and which is counterfeit. Extensive performance analysis of the proposed approach is carried out and its performance is compared with baseline approaches [ 25 ]. The results of the experiments show that the proposed approach outperforms the baseline approaches as much as 99% in the detection accuracy with a reduced communication overhead under varying RFID tag cloning ratio.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…We propose a dual verification strategy that combines consistent dual hash collisions with tag reading frequency aggregated over time intervals to verify which of the suspicious tags is genuine and which is counterfeit. Extensive performance analysis of the proposed approach is carried out and its performance is compared with baseline approaches [ 25 ]. The results of the experiments show that the proposed approach outperforms the baseline approaches as much as 99% in the detection accuracy with a reduced communication overhead under varying RFID tag cloning ratio.…”
Section: Introductionmentioning
confidence: 99%
“…Extensive performance analysis of the proposed approach is carried out and compared with BASE and DeClone, the approaches proposed in [ 25 ].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations