Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/76501
DC FieldValueLanguage
dc.contributor.authorBu, Ken_US
dc.contributor.authorWeng, MYen_US
dc.contributor.authorZheng, Yen_US
dc.contributor.authorXiao, Ben_US
dc.contributor.authorLiu, Xen_US
dc.date.accessioned2018-05-10T02:56:05Z-
dc.date.available2018-05-10T02:56:05Z-
dc.date.issued2017-
dc.identifier.citationIEEE communications surveys and tutorials, 2017, v. 19, no. 3, p. 1682-1700en_US
dc.identifier.issn1553-877X-
dc.identifier.urihttp://hdl.handle.net/10397/76501-
dc.description.abstractRadio-frequency identification (RFID) is one of the driving technologies for Internet of Things. The architecture-succinctness and cost-effectiveness of RFID tags promise their proliferation as well as allure security and privacy breaches. The cloning attack using clone tags to impersonate genuine tags can lead to unimaginable threats because RFID applications equate tag genuineness to the authenticity of tagged objects. Proposed countermeasures, however, keep showing limitations in effectiveness, efficiency, security, privacy, or applicability as new RFID applications emerge. The countermeasures therefore require constant review and improvement to stay at the leading edge. In this paper, we conduct the first comprehensive and systematic survey of RFID clone prevention and detection solutions. We systematically classify existing RFID cloning countermeasures over the period 2003-2016, sketch the main idea and highlight the strengths and weaknesses of each solution type, and summarize the similarity and difference among solution types. We find that RFID cloning countermeasures turn to be much more complex to design than they were thought in the literature. Prevention solutions can hardly thwart RFID cloning completely. Detection solutions may have specific application requirements to take effect. Many open issues further complicate the design of RFID cloning countermeasures. We hope that our survey can provide academic researchers and industrial engineers with useful references to combat RFID cloning and therefore to secure RFID ecosystem.en_US
dc.description.sponsorshipDepartment of Computingen_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineersen_US
dc.relation.ispartofIEEE communications surveys and tutorialsen_US
dc.subjectRFIDen_US
dc.subjectIoTen_US
dc.subjectCloning attacken_US
dc.subjectPreventionen_US
dc.subjectDetectionen_US
dc.titleYou can clone but you cannot hide : a survey of clone prevention and detection for RFIDen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.spage1682-
dc.identifier.epage1700-
dc.identifier.volume19-
dc.identifier.issue3-
dc.identifier.doi10.1109/COMST.2017.2688411-
dc.identifier.isiWOS:000408253800014-
dc.identifier.eissn1553-877X-
dc.identifier.rosgroupid2017004055-
dc.description.ros2017-2018 > Academic research: refereed > Publication in refereed journal-
dc.description.validate201805 bcrc-
Appears in Collections:Journal/Magazine Article
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

SCOPUSTM   
Citations

8
Last Week
0
Last month
Citations as of Apr 3, 2019

WEB OF SCIENCETM
Citations

5
Last Week
0
Last month
Citations as of Dec 2, 2019

Page view(s)

81
Last Week
3
Last month
Citations as of Dec 3, 2019

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.