2009
DOI: 10.1007/978-3-642-01516-8_20
|View full text |Cite
|
Sign up to set email alerts
|

Securing RFID Systems by Detecting Tag Cloning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
31
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 61 publications
(31 citation statements)
references
References 16 publications
0
31
0
Order By: Relevance
“…Lehtonen et al [7] proposed a synchronized secrets method, which uses tag's rewritable memory. The random number in a tag is changed every time the tag is used.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Lehtonen et al [7] proposed a synchronized secrets method, which uses tag's rewritable memory. The random number in a tag is changed every time the tag is used.…”
Section: Related Workmentioning
confidence: 99%
“…Mutual authentication between legitimate tag and server has been widely proposed by researchers [2,7,8,15,16]. Lehtonen et al [7] proposed a synchronized secrets method, which uses tag's rewritable memory.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The fundamental difficulties of such an approach revolve around the trade-off between tag cost, level of security, and hardware functionalities. As a matter of fact, RFID tags are typically deployed in great amount and the end-user companies have a strong financial incentive to minimize the tag cost and, thus, the features the tags provide (Lehtonen et al, 2009). As a result, it is extremely difficult to use cryptography for protecting low cost tags from cloning, due to their limited power, storage and processing resources.…”
Section: Motivationsmentioning
confidence: 99%
“…Protocols in [6], [10]- [12] focus solely on RFID-enabled supply chains; they collect IDs from supply chain partners and detect the cloning attack when an ID simultaneously shows up at different places. Protocols in [4], [13], [14] write a new random number on a tag's memory each time the tag is scanned and maintain a map of tag IDs and corresponding random numbers. These protocols collect both tag IDs and random numbers from tags.…”
Section: Introductionmentioning
confidence: 99%