2010 IEEE International Conference on RFID (IEEE RFID 2010) 2010
DOI: 10.1109/rfid.2010.5467236
|View full text |Cite
|
Sign up to set email alerts
|

Blocking Reader: Design and implementation of a low-cost passive UHF RFID Blocking Reader

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 17 publications
(14 reference statements)
0
2
0
Order By: Relevance
“…Since regular RFID tags cannot be turned-off, this is usually done by disrupting the wireless communications between the reader and tag so that the unauthorized reader cannot get any meaningful data from the tags. The powerful tag can be a modified RFID tag [21], or a specially designed embedded device [22], [23]. The main difference is that in previous solutions, the powerful tag was designed to prevent an unauthorized reader from accessing the rest of the tags.…”
Section: Related Workmentioning
confidence: 99%
“…Since regular RFID tags cannot be turned-off, this is usually done by disrupting the wireless communications between the reader and tag so that the unauthorized reader cannot get any meaningful data from the tags. The powerful tag can be a modified RFID tag [21], or a specially designed embedded device [22], [23]. The main difference is that in previous solutions, the powerful tag was designed to prevent an unauthorized reader from accessing the rest of the tags.…”
Section: Related Workmentioning
confidence: 99%
“…It shows that the well-used data security policies can guarantee information security for low-cost passive tags. In addition, RFID reader’s access to tag can be controlled through some schemes, such as mutual authentication [ 7 ], light-weighted cryptographic algorithms [ 8 ], collision-resolution protocols [ 9 ], blocking technology [ 10 ], etc ., which can ensure the integrity and credibility of tag information with minimum information leakage and legality of tag owners. Zhou et al proposed the Smart RFID Keeper (SRK), which controls reader’s unauthorized access to tags based on blocking technology [ 11 ].…”
Section: Related Workmentioning
confidence: 99%