2015
DOI: 10.1007/978-3-319-24018-3_14
|View full text |Cite
|
Sign up to set email alerts
|

Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality

Abstract: Radio frequency identification (RFID) is a core component of the Internet-of-Things. In certain cases the communication between the tag and the reader needs to be confidential. Some passive RFID tags have very limited computational power and can therefore not implement standard cryptographic mechanisms. This has led to several proposals where data sent by the RFID tag is 'hidden' by noisy signals generated by the RFID reader. The RFID reader can remove the noise but third-party adversaries cannot, thereby ensu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
2
1
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…al. [21] also aims at mitigating the same problem of data leakage by signal desynchronization identified in our earlier work [13]. Their method adds high frequency noise, much higher frequency than that of the data, at transitions of the bit period.…”
Section: Accepted Manuscriptmentioning
confidence: 96%
See 1 more Smart Citation
“…al. [21] also aims at mitigating the same problem of data leakage by signal desynchronization identified in our earlier work [13]. Their method adds high frequency noise, much higher frequency than that of the data, at transitions of the bit period.…”
Section: Accepted Manuscriptmentioning
confidence: 96%
“…Our previous research [13] has successfully simulated an eavesdropping attack on this jamming scheme. Simulation results show that we can reliably circumvent the primary Power Varying scheme under certain realistic conditions.…”
Section: Introductionmentioning
confidence: 99%
“…It shows that the eavesdropper can not distinguish the bits with sequence 10 as the amplitudes of these two bits are the same. But according to another paper ( Hu et al, 2015 ), this method is vulnerable due to the unsynchronization of the reader signal and the tag signal. So this paper improved the vulnerable method by randomizing the interval and the increasing value.…”
Section: Self-jammingmentioning
confidence: 99%