ACD: An Adaptable Approach for RFID Cloning Attack Detection
With the rapid development of the internet of things, radio frequency identification (RFID) technology plays an important role in various fields. However, RFID systems are vulnerable to cloning attacks. This is the fabrication of one or more replicas of a genuine tag, which behave exactly as a genui...
المؤلفون الرئيسيون: | Weiqing Huang, Yanfang Zhang, Yue Feng |
---|---|
التنسيق: | مقال |
اللغة: | English |
منشور في: |
MDPI AG
2020-04-01
|
سلاسل: | Sensors |
الموضوعات: | |
الوصول للمادة أونلاين: | https://www.mdpi.com/1424-8220/20/8/2378 |
مواد مشابهة
-
Comparison of Dijkstra dan Floyd-Warshall Algorithm to Determine the Best Route of Train
حسب: Tri Setya Dermawan
منشور في: (2019-01-01) -
Heuristic Greedy-Gradient Route Search Method for Finding an Optimal Traffic Distribution in Telecommunication Networks
حسب: Konstantin Gaipov, وآخرون
منشور في: (2023-12-01) -
Evaluation of Shortest Paths in Road Network
حسب: Farrukh Shehzad, وآخرون
منشور في: (2009-06-01) -
Iterative Algorithm for Finding the Shortest Ways in an Unweighted Undirected Graph
حسب: Valentin Sysoev
منشور في: (2021-09-01) -
Research on the Modeling and Simulation of Optimal Dynamic Aerial Ammunition Scheduling and Transportation
منشور في: (2018-12-01)