2022
DOI: 10.1016/j.sysarc.2022.102394
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and accurate identification of missing tags for large-scale dynamic RFID systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…Many different methods of simulating the dynamic RFID systems can be find in the literature on the subject [49]- [56]. Most of them use time domain modeling and radio channel multiple access.…”
Section: B Dynamic Identification Modelmentioning
confidence: 99%
“…Many different methods of simulating the dynamic RFID systems can be find in the literature on the subject [49]- [56]. Most of them use time domain modeling and radio channel multiple access.…”
Section: B Dynamic Identification Modelmentioning
confidence: 99%
“…With offline serialization and online identification, the effect of unknown tags is reduced. In [29], Chen et al presented an efficient and accurate protocol to identify missing tags in high dynamic RFID systems. They combined the reply slot location and reply bits of tags for simultaneous missing tag identification and unknown tag filtering.…”
Section: Missing Tag Identification With Unknown Tagsmentioning
confidence: 99%
“…The slot index is generated by an irreversible one-way hash function with the input of a tag EPC and a random seed r. If each tag has a distinct hash function, the attackers cannot know the hash function and thus fail to make a perfect counterfeit tag with the same slot index sequence produced by the original one. However, the hash-based scheme assumes the authenticator exactly knowing the hash functions embedded in each individual tag [12], [13], which is very challenging and bring much complexity to the RFID system. A central authentication server is needed for managing the embedded hash functions of each tag, and distribute the hash functions to trust user at needed time.…”
Section: Introductionmentioning
confidence: 99%