Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/76501
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.creatorBu, K-
dc.creatorWeng, MY-
dc.creatorZheng, Y-
dc.creatorXiao, B-
dc.creatorLiu, X-
dc.date.accessioned2018-05-10T02:56:05Z-
dc.date.available2018-05-10T02:56:05Z-
dc.identifier.issn1553-877X-
dc.identifier.urihttp://hdl.handle.net/10397/76501-
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineersen_US
dc.subjectRFIDen_US
dc.subjectIoTen_US
dc.subjectCloning attacken_US
dc.subjectPreventionen_US
dc.subjectDetectionen_US
dc.titleYou can clone but you cannot hide : a survey of clone prevention and detection for RFIDen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.spage1682-
dc.identifier.epage1700-
dc.identifier.volume19-
dc.identifier.issue3-
dc.identifier.doi10.1109/COMST.2017.2688411-
dcterms.abstractRadio-frequency identification (RFID) is one of the driving technologies for Internet of Things. The architecture-succinctness and cost-effectiveness of RFID tags promise their proliferation as well as allure security and privacy breaches. The cloning attack using clone tags to impersonate genuine tags can lead to unimaginable threats because RFID applications equate tag genuineness to the authenticity of tagged objects. Proposed countermeasures, however, keep showing limitations in effectiveness, efficiency, security, privacy, or applicability as new RFID applications emerge. The countermeasures therefore require constant review and improvement to stay at the leading edge. In this paper, we conduct the first comprehensive and systematic survey of RFID clone prevention and detection solutions. We systematically classify existing RFID cloning countermeasures over the period 2003-2016, sketch the main idea and highlight the strengths and weaknesses of each solution type, and summarize the similarity and difference among solution types. We find that RFID cloning countermeasures turn to be much more complex to design than they were thought in the literature. Prevention solutions can hardly thwart RFID cloning completely. Detection solutions may have specific application requirements to take effect. Many open issues further complicate the design of RFID cloning countermeasures. We hope that our survey can provide academic researchers and industrial engineers with useful references to combat RFID cloning and therefore to secure RFID ecosystem.-
dcterms.bibliographicCitationIEEE communications surveys and tutorials, 2017, v. 19, no. 3, p. 1682-1700-
dcterms.isPartOfIEEE communications surveys and tutorials-
dcterms.issued2017-
dc.identifier.isiWOS:000408253800014-
dc.identifier.eissn1553-877X-
dc.identifier.rosgroupid2017004055-
dc.description.ros2017-2018 > Academic research: refereed > Publication in refereed journal-
dc.description.validate201805 bcrc-
Appears in Collections:Journal/Magazine Article
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

SCOPUSTM   
Citations

11
Last Week
0
Last month
Citations as of Feb 1, 2020

WEB OF SCIENCETM
Citations

5
Last Week
0
Last month
Citations as of Feb 12, 2020

Page view(s)

108
Last Week
3
Last month
Citations as of Feb 12, 2020

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.