2017
DOI: 10.1109/comst.2017.2688411
|View full text |Cite
|
Sign up to set email alerts
|

You Can Clone But You Cannot Hide: A Survey of Clone Prevention and Detection for RFID

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(13 citation statements)
references
References 75 publications
0
13
0
Order By: Relevance
“…In this case, if the tag does not perform a reliable mutual authentication, the attacker reader could impersonate readers as if it were an authentic reader in the network and transmit misleading messages to the tag. Desynchronization: The attacker tries to prevent the continuity of communication by violating the availability of Tag Cloning: In the cloning attack, an attacker first obtains confidential information from a tag, then clones the tag [2]. Thus, the security of the RFID system can be compromised by copying firmware, software, and secret keys since RFID tags deployed in remote environments are exposed to being caught physically and deceived.…”
Section: Security Attacksmentioning
confidence: 99%
See 3 more Smart Citations
“…In this case, if the tag does not perform a reliable mutual authentication, the attacker reader could impersonate readers as if it were an authentic reader in the network and transmit misleading messages to the tag. Desynchronization: The attacker tries to prevent the continuity of communication by violating the availability of Tag Cloning: In the cloning attack, an attacker first obtains confidential information from a tag, then clones the tag [2]. Thus, the security of the RFID system can be compromised by copying firmware, software, and secret keys since RFID tags deployed in remote environments are exposed to being caught physically and deceived.…”
Section: Security Attacksmentioning
confidence: 99%
“…: Required : Not required (1) Assume that PRNG is equivalent to the one-way function (2) k is the number of emergency unlinkable pseudo identities (3) Not provided…”
Section: Performance Of the Authentication Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…impeccably secure access control [9]. A possible solution is to use chipless RFID tags, whereby access key cloning becomes challenging.…”
Section: Introductionmentioning
confidence: 99%