2018
DOI: 10.1371/journal.pone.0193951
|View full text |Cite
|
Sign up to set email alerts
|

Clone tag detection in distributed RFID systems

Abstract: Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID tech… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
4
1

Relationship

2
8

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 33 publications
0
8
0
1
Order By: Relevance
“…The supply chain provides another platform for introducing software clone attacks, such as cloned and compromised RFID tags, which may help attackers to acquire confidential credentials and authorization information to compromise the supply chain system. Researchers [57]- [60] have proposed several clone detection approaches for an RFID-embedded supply chain system, and these approaches can be applied to vulnerable RFID tag clone detection with the appropriate improvement.…”
Section: A: Sensor Networkmentioning
confidence: 99%
“…The supply chain provides another platform for introducing software clone attacks, such as cloned and compromised RFID tags, which may help attackers to acquire confidential credentials and authorization information to compromise the supply chain system. Researchers [57]- [60] have proposed several clone detection approaches for an RFID-embedded supply chain system, and these approaches can be applied to vulnerable RFID tag clone detection with the appropriate improvement.…”
Section: A: Sensor Networkmentioning
confidence: 99%
“…The trajectory to be tested was compared with the normal trajectory characteristics, and the threshold will determine whether the trajectory was abnormal. Kamaludin et al used statistical methods to identify abnormal tags [24]. A tag that frequently appears in one place is considered abnormal.…”
Section: Trajectory-based Rfid Clone Detectionmentioning
confidence: 99%
“…Z tohoto důvodu je důležité, že implementovaná technologie v sobě již v základu kombinuje zabezpečení i sledování stavu jednotlivých položek a mělo to přímý vliv na pozitivní odezvu od vedení společnosti při představení návrhu. Při zvažování dalších funkcí, kterými by měl disponovat systém pro zabezpečení, byla prozkoumána i možnost pro ochranu před neoprávněným klonováním RFID čipů (Kamaludin et al, 2018), která sice zatím nebyla uplatněna v našem řešení, ale vyvolala otázku, zda by neměla být součástí jiných důležitých systémů, které společnost používá. Pro oprávnění osob ke vstupu a pohybu po budově společnosti se standardně využívají bezkontaktní HID (Hughes Identification Device) karty na bázi RFID.…”
Section: Optimalizace úRovně Poskytovaných Služeb Pro Uživateleunclassified