2013 IEEE International Conference in MOOC, Innovation and Technology in Education (MITE) 2013
DOI: 10.1109/mite.2013.6756297
|View full text |Cite
|
Sign up to set email alerts
|

RFID: An appraisal of malevolent attacks on RFID security system and its resurgence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…As the L 2 weight decay and dropout regularization are applied to constrain the learning process, the generalization error in the learning process can be reduced, and the model has a good generalization effect [29]. The L 2 regularization strategy selects 10 -6 weight decay, and the objective function is modified as equation (19).…”
Section: Ai and DLmentioning
confidence: 99%
“…As the L 2 weight decay and dropout regularization are applied to constrain the learning process, the generalization error in the learning process can be reduced, and the model has a good generalization effect [29]. The L 2 regularization strategy selects 10 -6 weight decay, and the objective function is modified as equation (19).…”
Section: Ai and DLmentioning
confidence: 99%
“…ISO/IEC 14443 consists of four parts: (1) physical characteristics, (2) RF power and signal interface, (3) initialization and anti-collision, and (4) transmission protocol. It also defines two kinds of tags (type A and type B), which differ in parts (2) and (3). Table 1 shows the differences in terms of modulation and coding between both types [in such a table, the reader is called proximity coupling device (PCD), and the tag is the proximity integrated circuit card (PICC)].…”
Section: Understanding the Underlying Protocolsmentioning
confidence: 99%
“…However, despite becoming an everyday technology, many public and private entities have not considered the security of RFID systems as a basic requirement. In fact, it is easy to find many commercial systems that contain critical security flaws and vulnerabilities [1,2] that allow for cloning tags or for straight signal replaying. Such vulnerabilities let attackers access certain services or facilities, get or alter personal information, and even track people.…”
Section: Introductionmentioning
confidence: 99%
“…Most of the developed countries are running behind the RFID technology to strengthen their tracking accuracy. Currently, RFID systems are used for various tiny Tracking applications [3]- [6]. Some of the major real-time applications of RFID systems are the Internet of Things (IoT), Supply chain management, Vehicle tracking and location Identification of an object [7]- [11].…”
Section: Introductionmentioning
confidence: 99%