2019
DOI: 10.3390/s19102220
|View full text |Cite
|
Sign up to set email alerts
|

UHF RFID Prototyping Platform for ISO 29167 Decryption Based on an SDR

Abstract: Ultra high frequency radio frequency identification (UHF RFID) is becoming a key technology in the Internet of Things. It allows the implementation of batteryless and wireless nodes, including sensors and actuators. Due to its possible transmission range of >10 m and potential to carry critical information, security is a highly important topic. For this reason, the International Organization for Standardization has published several crypto suites for UHF RFID within the ISO-29167 standard in 2014. Recently,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…• The authors suggested a shared authentication scheme for IoT RFID-based applications in fifth generation of mobile networks (5G) by providing a cache to the user, storing the keys (used for authentication) for the tags recently visited, speeding up authentication, minimizing computation costs and the storage security. On the other hand, the authors in [91] has been proposed authentication methods for heterogeneous networks which can be applied to RFID systems as well. Therefore, a prototyping platform intended to conduct practical experiments in the creation of new technology in UHF RFID systems is not suitable.…”
Section: Cloningmentioning
confidence: 99%
“…• The authors suggested a shared authentication scheme for IoT RFID-based applications in fifth generation of mobile networks (5G) by providing a cache to the user, storing the keys (used for authentication) for the tags recently visited, speeding up authentication, minimizing computation costs and the storage security. On the other hand, the authors in [91] has been proposed authentication methods for heterogeneous networks which can be applied to RFID systems as well. Therefore, a prototyping platform intended to conduct practical experiments in the creation of new technology in UHF RFID systems is not suitable.…”
Section: Cloningmentioning
confidence: 99%
“…In actual applications, such as the scanning of shipments in an express warehouse, the shipments at the beginning are scattered on a conveyor belt. The UHF reader [27] is selected as it has a very long working distance (its working frequency is 862 (902)~928 MHz, and it fully supports electronic tags that comply with the EPC CLASS1 G2 and ISO18000-6B standards [28]. Its working distance is usually greater than 1 m, typically 4~6 m. Two readers are built and fixed on the upper end of the conveyor belt.…”
Section: Double Reader Model and Cloud Platform Architecturementioning
confidence: 99%