2021
DOI: 10.1007/978-3-030-85928-2_27
|View full text |Cite
|
Sign up to set email alerts
|

URTracker: Unauthorized Reader Detection and Localization Using COTS RFID

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…The second category is the use of application layer data for detection. Sun et al [18] use the changes in throughput to determine whether there is an unauthorized reading. However, the detection based on physical layer signal characteristics requires additional USRP devices, which leads to system costs increasing.…”
Section: Related Workmentioning
confidence: 99%
“…The second category is the use of application layer data for detection. Sun et al [18] use the changes in throughput to determine whether there is an unauthorized reading. However, the detection based on physical layer signal characteristics requires additional USRP devices, which leads to system costs increasing.…”
Section: Related Workmentioning
confidence: 99%