ACD: An Adaptable Approach for RFID Cloning Attack Detection
With the rapid development of the internet of things, radio frequency identification (RFID) technology plays an important role in various fields. However, RFID systems are vulnerable to cloning attacks. This is the fabrication of one or more replicas of a genuine tag, which behave exactly as a genui...
Những tác giả chính: | Weiqing Huang, Yanfang Zhang, Yue Feng |
---|---|
Định dạng: | Bài viết |
Ngôn ngữ: | English |
Được phát hành: |
MDPI AG
2020-04-01
|
Loạt: | Sensors |
Những chủ đề: | |
Truy cập trực tuyến: | https://www.mdpi.com/1424-8220/20/8/2378 |
Những quyển sách tương tự
-
Comparison of Dijkstra dan Floyd-Warshall Algorithm to Determine the Best Route of Train
Bằng: Tri Setya Dermawan
Được phát hành: (2019-01-01) -
Heuristic Greedy-Gradient Route Search Method for Finding an Optimal Traffic Distribution in Telecommunication Networks
Bằng: Konstantin Gaipov, et al.
Được phát hành: (2023-12-01) -
Evaluation of Shortest Paths in Road Network
Bằng: Farrukh Shehzad, et al.
Được phát hành: (2009-06-01) -
Iterative Algorithm for Finding the Shortest Ways in an Unweighted Undirected Graph
Bằng: Valentin Sysoev
Được phát hành: (2021-09-01) -
Research on the Modeling and Simulation of Optimal Dynamic Aerial Ammunition Scheduling and Transportation
Được phát hành: (2018-12-01)