- DE DONNO, Danilo, CATARINUCCI, Luca, and TARRICON, Lucian. 2013. A battery-assisted sensor-enhanced RFID tag enabling heterogeneous wireless sensor networks. IEEE Sensors Journal , 14.4: 1048-1055Google Scholar
- A. Tewari and B. B. Gupta. 2017. Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. The Journal of Supercomputing. vol. 73, no. 3, pp. 1085-1102Google ScholarCross Ref
- Y. Tu and S. Piramuthu. 2017. Lightweight non-distance-bounding means to address RFID relay attacks. Decision Support Systems. vol. 10, no. 2, pp. 12-21Google ScholarCross Ref
- A. Sari. 2014. Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks. Transactions on Networks and Communications, vol. 2, no. 5, pp. 01-06Google ScholarCross Ref
- C. H. Kim and G. Avoine. 2009. RFID distance bounding protocol with mixed challenges to prevent relay attacks. In International Conference on Cryptology And Network Security. Springer, Berlin, HeidelbergGoogle Scholar
- J. Munilla and A. Peinado. 2010. Attacks on a distance bounding protocol. Computer Communications. vol. 33, no. 7, pp. 884-889Google ScholarDigital Library
- G. Kapoor, W. Zhou and S. Piramuthu. 2008. Distance bounding protocol for multiple RFID tag authentication. In 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous ComputingGoogle Scholar
- S.-J. W.-Q. Z. a. J. Q. L. Zhou. 2015. Survey of privacy of radio frequency identification technology. Journal of Software 26.4Google Scholar
- Roberts and M. Chris. 2006. Radio frequency identification (RFID). Computers & security 25.1Google Scholar
- Hunt, V. Daniel, A. Albert Puglia and M. Mike Puglia. 2007. RFID: a guide to radio frequency identification, John Wiley & SonsGoogle Scholar
- G. P. Hancke and M. G. Kuhn. 2008. Attacks on time-of-flight distance bounding channels. In Proceedings of the first ACM conference on Wireless network security. ACMGoogle Scholar
- J. e. a. Reid. 2007. Detecting relay attacks with timing-based protocols. In Proceedings of the 2nd ACM symposium on Information. computer and communications security, ACMGoogle ScholarDigital Library
- P. e. a. Peris-Lopez. 2009. Shedding some light on RFID distance bounding protocols and terrorist attacksGoogle Scholar
- Silva, Bruno and Gerhard P. Hancke. 2016. IR-UWB-based non-line-of-sight identification in harsh environments: Principles and challenges. IEEE Transactions on Industrial Informatics 12.36Google Scholar
- Y. Zhou and J. Zhou. 2016. Distance bounding protocol for RFID Systems. In International Conference on Wireless Algorithms. Systems and Application. ChamGoogle Scholar
- S. Guizani. 2016. Relay attacks concerns in wireless ad hoc, sensors, and RFID networks. Wireless Communications and Mobile Computing. vol. 16, no. 11, pp. 1431-1435Google ScholarDigital Library
- G. Wei, H. Zhang and Y. Wang. 2016. A new relay attack on distance bounding protocols and its solution with time-stamped authentication for RFID. Wuhan University Journal of Natural Sciences. vol. 21, no. 1, pp. 37-46Google ScholarCross Ref
- Tom Karygiannis, Bernard Eydt, Greg Barber, Lynn Bunn and Ted Phillips. 2007. Guidelines for securing radio frequency identification (RFID) systems. NIST Special publication 80Google Scholar
- Shih, Dong‐Her, P. Sun and B. Lin. 2005. Securing industry‐wide EPCglobal network with WS‐security. Industrial Management & Data SystemsGoogle Scholar
- Singelee, Dave and Bart Preneel. 2005. Location verification using secure distance bounding protocols. IEEE International Conference on Mobile Adhoc and Sensor Systems ConferenceGoogle Scholar
- Hancke, Gerhard P and Markus G. Kuhn. 2005. An RFID distance bounding protocol, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05). IEEEGoogle Scholar
- Hutter, Michael & Schmidt, Jorn-Marc & Plos, Thomas. 2009. Contact-Based Fault Injections and Power Analysis on RFID Tags. 409 - 412. 10.1109/ECCTD.2009.5275012Google Scholar
- Y. Oren and A. Shamir. 2006. Remote Power Analysis of RFID Tags. Master's thesis, Weizmann Institute of Science, Rehovot. IsraelGoogle Scholar
- N. D. P. Avirneni and A. K. Somani. 2014. Countering Power Analysis Attacks UsingReliable and Aggressive Designs. In IEEE Transactions on Computers. vol. 63, no. 6, pp. 1408-1420. doi: 10.1109/TC.2013.9Google ScholarDigital Library
- Mitrokotsa, Aikaterini & Rieback, Melanie & Tanenbaum, Andrew. 2008. Classification of RFID Attacks. 73-86Google Scholar
Recommendations
Radio frequency identification (RFID)
First conceived in 1948, Radio Frequency Identification (RFID) has taken many years for the technology to mature to the point where it is sufficiently affordable and reliable for widespread use. From Electronic Article Surveillance (EAS) for article (...
Security and privacy on low-cost Radio Frequency Identification systems
Radio Frequency Identification (RFID) systems have already been widely applied in industry supporting supply chain management and inventory control. While the continuation increasing applications of RFID in our daily life, RFID also creates new security ...
Comments