2023
DOI: 10.1109/access.2023.3269571
|View full text |Cite
|
Sign up to set email alerts
|

Fast Counterfeit RFID Tags Detection With Slot Constraints

Abstract: RFID tags are prone to counterfeit attacks in supply chain scenarios. The attacker often uses counterfeit tags to replace stolen tags to avoid being detected by the inventory process.To defend against such attacks, existing hash-based schemes have to know the hash functions embedded in tags, which are usually unavailable in large scale systems. This letter proposes a novel group-based slot constraint (GSC) scheme for lightweight counterfeit tag detection in RFIDenabled supply-chain systems. GSC can be integrat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 37 publications
0
0
0
Order By: Relevance