Fast Counterfeit RFID Tags Detection With Slot Constraints

RFID tags are prone to counterfeit attacks in supply chain scenarios. The attacker often uses counterfeit tags to replace stolen tags to avoid being detected by the inventory process. To defend against such attacks, existing hash-based schemes have to know the hash functions embedded in tags, which...

Full description

Bibliographic Details
Main Authors: Bing Zhang, Xu Hu, Shan Gao
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10107370/