Detection of RFID cloning attacks: A spatiotemporal trajectory data stream-based practical approach
Tài liệu tham khảo
Ilie-Zudor, 2011, A survey of applications and requirements of unique identification systems and RFID techniques, Comput. Ind., 62, 227, 10.1016/j.compind.2010.10.004
Bono, 2005, Security analysis of a cryptographically-enabled RFID device, 1
Garcia, 2008, Dismantling MIFARE classic, 97
Oswald, 2011, Breaking mifare DESFire MF3ICD40: Power analysis and templates in the real world, 207
Xu, 2018, Side-channel attack on a protected RFID card, IEEE Access, 6, 58395, 10.1109/ACCESS.2018.2870663
X. Chen, J. Liu, X. Wang, X. Zhang, Y. Wang, L. Chen, Combating tag cloning with COTS RFID devices, in: 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON, 2018, pp. 1–9.
Garcia, 2008, Dismantling mifare classic, vol. 5283, 97, 10.1007/978-3-540-88313-5_7
G. Zhang, L. Xia, S. Jia, Y. Ji, Identification of cloned HF RFID proximity cards based on RF fingerprinting, in: 2016 IEEE Trustcom/BigDataSE/I SPA, 2016.
Zanetti, 2010, 353
M. Krumnikl, P. Moravec, P. Olivka, D. Seidl, EM410x RFID cloned card detection system, in: 2015 International Conference on Pervasive and Embedded Computing and Communication Systems, PECCS, 2015, pp. 76–82.
Okpara, 2015
Zanetti, 2013
Lehtonen, 2009, Securing RFID systems by detecting tag cloning, 291
Bu, 2014, Approaching the time lower bound on cloned-tag identification for large RFID systems, Ad Hoc Netw., 13, 271, 10.1016/j.adhoc.2013.08.011
Bu, 2013, Unreconciled collisions uncover cloning attacks in anonymous RFID systems, IEEE Trans. Inf. Forensics Secur., 8, 429, 10.1109/TIFS.2012.2237395
Bu, 2015, Deterministic detection of cloning attacks for anonymous RFID systems, IEEE Trans. Ind. Inf., 11, 1255, 10.1109/TII.2015.2482921
J. Shi, S.M. Kywe, Y. Li, Batch clone detection in RFID-enabled supply chain, in: IEEE RFID 2014: IEEE International Conference on RFID, April 8–10, 2014, Orlando, Florida: Proceedings, 2014, pp. 118–125.
Blass, 2010, Tracker: Security and privacy for RFID-based supply chains
Elkhiyaoui, 2011, CHECKER: on-site checking in RFID-based supply chains, IACR Cryptol. ePrint Arch., 2011, 651
Maleki, 2016, LightSource: Ultra lightweight clone detection of RFID tags from software unclonable responses, IACR Cryptol. ePrint Arch., 2016, 608
Ouafi, 2009, Pathchecker: An RFID application for tracing products in Supply-chains
Peichao, 2017, Analysis on abnormal behavior of insider threats based on accesslog mining, CAAI Trans. Intell. Syst.
Burmester, 2018, Comments on “unreconciled collisions uncover cloning attacks in anonymous RFID systems”, IEEE Trans. Inf. Forensics Secur., 13, 2929, 10.1109/TIFS.2018.2834876
Huang, 2020, ACD: an adaptable approach for RFID cloning attack detection, Sensors, 20, 2378, 10.3390/s20082378
S. Broumi, A. Bakal, M. Talea, F. Smarandache, L. Vladareanu, Applying Dijkstra algorithm for solving neutrosophic shortest path problem, in: 2016 International Conference on Advanced Mechatronic Systems, ICAMechS, 2016, pp. 412–416.
Swathika, 2016, Prims-aided Dijkstra algorithm for adaptive protection in microgrids, IEEE J. Emerg. Sel. Top. Power Electron., 4, 1279, 10.1109/JESTPE.2016.2581986
Zhang, 2018, When Dijkstra meets vanishing point: A stereo vision approach for road detection, IEEE Trans. Image Process., 27, 2176, 10.1109/TIP.2018.2792910
Subramanian, 2020, 48
G. Qing, Z. Zheng, X. Yue, Path-planning of automated guided vehicle based on improved Dijkstra algorithm, in: 2017 29th Chinese Control and Decision Conference, CCDC, 2017, pp. 7138–7143.
Baeza, 2017, A comparison between ACO and Dijkstra algorithms for optimal ore concentrate pipeline routing, J. Cleaner Prod., 144, 149, 10.1016/j.jclepro.2016.12.084