You can clone but you cannot hide: A survey of clone prevention and detection for RFID
Radio-frequency identification (RFID) is one of the driving technologies for Internet of
Things. The architecture-succinctness and cost-effectiveness of RFID tags promise their …
Things. The architecture-succinctness and cost-effectiveness of RFID tags promise their …
Flexible and time-efficient tag scanning with handheld readers
Tag scanning is an important issue to dynamically manage tag IDs in radio frequency
identification (RFID) systems. Different from tag identification that collects IDs of all the tags …
identification (RFID) systems. Different from tag identification that collects IDs of all the tags …
STEP: A time-efficient tag searching protocol in large RFID systems
The radio frequency identification (RFID) technology is greatly revolutionizing applications
such as warehouse management and inventory control in retail industry. In large RFID …
such as warehouse management and inventory control in retail industry. In large RFID …
A novel tag searching protocol with time efficiency and searching accuracy in RFID systems
CG Liu, IH Liu, CD Lin, JS Li - Computer Networks, 2019 - Elsevier
Radio frequency identification technology is very popular in many aspects such as inventory
management in retail industry, object tracking and identification, etc. In practice, searching …
management in retail industry, object tracking and identification, etc. In practice, searching …
Toward a new PHY layer scheme for decoding tags collision signal in UHF RFID system
M Benbaghdad, B Fergani… - IEEE Communications …, 2016 - ieeexplore.ieee.org
Tag collision is one of the most significant limitations of the RFID systems. Current anti-
collision algorithms process the problem in medium access control layer as an estimation of …
collision algorithms process the problem in medium access control layer as an estimation of …
Comb Decoding towards {Collision-Free}{WiFi}
Packet collisions happen every day in WiFi networks. RTS/CTS is a widely-used approach to
reduce the cost of collisions of long data packets as well as combat the hidden terminal …
reduce the cost of collisions of long data packets as well as combat the hidden terminal …
A cooperative Bayesian and lower bound estimation in dynamic framed slotted ALOHA algorithm for RFID systems
A novel estimation scheme that combines Bayesian and lower bound estimating radio
frequency identification tag population size is proposed. The developed methodology is …
frequency identification tag population size is proposed. The developed methodology is …
Who stole my cheese?: Verifying intactness of anonymous RFID systems
Abstract Radio-Frequency Identification (RFID) technology has fostered many object
monitoring applications. Along with this trend, a corresponding important problem is to verify …
monitoring applications. Along with this trend, a corresponding important problem is to verify …
Data-Oriented Approaches towards Mobile, Network and Secure Systems
S Zhao - 2021 - search.proquest.com
With the rapid evolvement of information science, data-oriented research has solicited a new
philosophy for the future mobile network and security design, since it can not only …
philosophy for the future mobile network and security design, since it can not only …
On Exploiting Concurrent Transmissions Through Discernible Interference Cancellation
This paper represents the design, feasibility evaluation, and performance validation of
ICMR, a novel cross layer protocol that can maximize concurrent transmissions and avoid …
ICMR, a novel cross layer protocol that can maximize concurrent transmissions and avoid …