2018
DOI: 10.1109/access.2018.2809480
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Practical RFID Ownership Transfer Protocol Based on Chebyshev Polynomials

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…When the reader abruptly decodes 16‐bit data, it generates a response with ACK message and informs tag to transfer the ID of corresponding transmission. Otherwise, the reader needs to initiate the successive slot, as multiple available tags are available for transmitting 39–41 . There are two diverse kinds of responses: (1) tag responds to Query REQUEST and Query RESPONSE command, and (2) tag responds to ACK command.…”
Section: Feature Analysesmentioning
confidence: 99%
See 1 more Smart Citation
“…When the reader abruptly decodes 16‐bit data, it generates a response with ACK message and informs tag to transfer the ID of corresponding transmission. Otherwise, the reader needs to initiate the successive slot, as multiple available tags are available for transmitting 39–41 . There are two diverse kinds of responses: (1) tag responds to Query REQUEST and Query RESPONSE command, and (2) tag responds to ACK command.…”
Section: Feature Analysesmentioning
confidence: 99%
“…Otherwise, the reader needs to initiate the successive slot, as multiple available tags are available for transmitting. [39][40][41] There are two diverse kinds of responses: (1) tag responds to Query REQUEST and Query RESPONSE command, and (2) tag responds to ACK command. The reader has to provide continuous wave for every tag underuse during tag response process.…”
Section: Tag Responsementioning
confidence: 99%
“…S r = T g c−Rr (ω) mod p (18) This certificate has three basic components:{B, R r , S r }. The first component B is the RSU public key after ensuring that its value is not changed during the transmission from the RSU to the TA.…”
Section: Registration Phasementioning
confidence: 99%
“…is study conducted simulation based on the arrival rates in these two cases. Obviously, these two cases cover the traditional applications of RFID, such as goods manufacturing line [5], tracking of animals and ranch inventory [33], smart warehouses, and commodity classification. e simulation results are shown in Section 5.…”
Section: Tag Arrival Rate Modelmentioning
confidence: 99%