ACD: An Adaptable Approach for RFID Cloning Attack Detection
With the rapid development of the internet of things, radio frequency identification (RFID) technology plays an important role in various fields. However, RFID systems are vulnerable to cloning attacks. This is the fabrication of one or more replicas of a genuine tag, which behave exactly as a genui...
Hlavní autoři: | Weiqing Huang, Yanfang Zhang, Yue Feng |
---|---|
Médium: | Článek |
Jazyk: | English |
Vydáno: |
MDPI AG
2020-04-01
|
Edice: | Sensors |
Témata: | |
On-line přístup: | https://www.mdpi.com/1424-8220/20/8/2378 |
Podobné jednotky
-
Comparison of Dijkstra dan Floyd-Warshall Algorithm to Determine the Best Route of Train
Autor: Tri Setya Dermawan
Vydáno: (2019-01-01) -
Heuristic Greedy-Gradient Route Search Method for Finding an Optimal Traffic Distribution in Telecommunication Networks
Autor: Konstantin Gaipov, a další
Vydáno: (2023-12-01) -
Evaluation of Shortest Paths in Road Network
Autor: Farrukh Shehzad, a další
Vydáno: (2009-06-01) -
Iterative Algorithm for Finding the Shortest Ways in an Unweighted Undirected Graph
Autor: Valentin Sysoev
Vydáno: (2021-09-01) -
Z-Score and Floyd Warshall Algorithms for Determining Alternative Routes of Mugging-Prone Areas in Medan City, Indonesia
Autor: Rozzi Kesuma Dinata, a další
Vydáno: (2023-12-01)