An IoT-based anti-counterfeiting system using visual features on QR code
This article presents an Internet-of-Things (IoT) anti-counterfeiting system that uses visual
features combined with the quick response (QR) code. The visual features guarantee the …
features combined with the quick response (QR) code. The visual features guarantee the …
Privacy-preserving group authentication for RFID tags using bit-collision patterns
When authenticating a group of radio-frequency identification tags, a common method is to
authenticate each tag with some challenge-response exchanges. However, sequentially …
authenticate each tag with some challenge-response exchanges. However, sequentially …
The Power of Precision: High-Resolution Backscatter Frequency Drift in RFID Identification
Physical-layer identification uses manufacturing variations to create unique identifiers for
each device. A decade ago, this concept was applied to RFID tags using backscatter …
each device. A decade ago, this concept was applied to RFID tags using backscatter …
An Efficient Authentication Protocol for Brand Cosmetics Anti-Counterfeiting System
X Meng, Q Yu, W Lang, Y Liang… - 2023 IEEE 10th …, 2023 - ieeexplore.ieee.org
The counterfeit brand cosmetics made available on the market have always been a
widespread concern. Traditional anti-counterfeiting schemes usually focus on the …
widespread concern. Traditional anti-counterfeiting schemes usually focus on the …
Toward a low-cost software-defined UHF RFID system for distributed parallel sensing
This article presents the design and implementation of a low-cost software-defined radio-
frequency identification (RFID) system for distributed parallel sensing. We aim to implement …
frequency identification (RFID) system for distributed parallel sensing. We aim to implement …
Fast Counterfeit RFID Tags Detection With Slot Constraints
B Zhang, X Hu, S Gao - IEEE Access, 2023 - ieeexplore.ieee.org
RFID tags are prone to counterfeit attacks in supply chain scenarios. The attacker often uses
counterfeit tags to replace stolen tags to avoid being detected by the inventory process. To …
counterfeit tags to replace stolen tags to avoid being detected by the inventory process. To …
Efficient and lightweight batch authentication for large-scale RFID systems
In this letter, we propose an efficient and lightweight bloom-filter-based batch authentication
(BBA) protocol. Comparing with existing complex data structures-based methods, BBA only …
(BBA) protocol. Comparing with existing complex data structures-based methods, BBA only …
BatAu: A Batch Authentication Scheme for Backscatter Devices in a Smart Home Network
With the maturity of the Internet of Things (IoT), many IoT applications have been
popularized and promoted. As one of the IoT technology, backscatter communication (BC) …
popularized and promoted. As one of the IoT technology, backscatter communication (BC) …
Energy-aware RFID authentication in edge computing
Q Yao, J Ma, R Li, X Li, J Li, J Liu - IEEE Access, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) devices are basic units in edge computing. Denial of service (DoS)
attack is a great threat to low-cost IoT devices, even worse in privacy-preserving …
attack is a great threat to low-cost IoT devices, even worse in privacy-preserving …
B-AUT: A universal architecture for batch RFID tags authentication
RFID tags authentication is always a critical but challenging problem because only checking
the EPC is vulnerable to counterfeiting attacks. Past works explore the unique backscat-ter …
the EPC is vulnerable to counterfeiting attacks. Past works explore the unique backscat-ter …