The 18th IEEE International Conference on Network Protocols 2010
DOI: 10.1109/icnp.2010.5762764
|View full text |Cite
|
Sign up to set email alerts
|

Identification-free batch authentication for RFID tags

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
63
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 91 publications
(63 citation statements)
references
References 21 publications
0
63
0
Order By: Relevance
“…Xie et al in [3] consider improving the reading efficiency for RFID tags along a moving conveyor belt. Yang et al [18] present an identification-free authentication protocol for efficiently pinpointing counterfeit tags. Tan [2] considers the automatic RFID-based detection for missingtag events.…”
Section: Related Workmentioning
confidence: 99%
“…Xie et al in [3] consider improving the reading efficiency for RFID tags along a moving conveyor belt. Yang et al [18] present an identification-free authentication protocol for efficiently pinpointing counterfeit tags. Tan [2] considers the automatic RFID-based detection for missingtag events.…”
Section: Related Workmentioning
confidence: 99%
“…Based on Anti-collision algorithms, Yang et al [17] design a batch authentication protocol SEBA to detect fake tags in tag batches. Given a batch of tags, a reader first broadcasts a size of frame, which consists of a series of time slots, to the tags.…”
Section: Related Workmentioning
confidence: 99%
“…Second, to avoid collisions among tag replies, sophisticated scheduling mechanisms need to be used during the authentication process, which results in additional communication overhead. As shown in [17], the communication overhead to authenticate a tag batch with 10000 tags is 14 minutes in ideal transmission conditions, which is unpractical in largescale RFID systems. In the RFID-enabled supply chain scenario, things become more complicated as the two requirements dynamically change when tags flow across different domains.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Thanks to the rapid development of Internet of Things [1]- [3], RFID technique is widely deployed in many areas, like Wal-Marts and university libraries [4]- [10]. Before putting on the shelves, items in these places are attached with passive RFID tags, which can be identified by passive RFID reader in a distance.…”
Section: Introductionmentioning
confidence: 99%