Probabilistic Analysis of Blocking Attack in RFID Systems

@article{Vahedi2011ProbabilisticAO,
  title={Probabilistic Analysis of Blocking Attack in RFID Systems},
  author={Ehsan Vahedi and Vahid Shah-Mansouri and Vincent W. S. Wong and Ian F. Blake and Rabab Kreidieh Ward},
  journal={IEEE Transactions on Information Forensics and Security},
  year={2011},
  volume={6},
  pages={803-817}
}
Radio-frequency identification (RFID) is a ubiquitous wireless technology which allows objects to be identified automatically. An RFID tag is a small electronic device with an antenna and has a unique serial number. Using RFID tags can simplify many applications and provide many benefits. Meanwhile, the privacy of the customers should be taken into account. A potential threat for the privacy of a user is that of anonymous readers obtaining information about the tags in the system. The use of a… CONTINUE READING
Highly Cited
This paper has 18 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 12 extracted citations

Fast Identification of Blocked RFID Tags

IEEE Transactions on Mobile Computing • 2018
View 5 Excerpts
Highly Influenced

Mobile RFID System in the Presence of Denial-of-Service Attacking Signals

IEEE Transactions on Automation Science and Engineering • 2017
View 5 Excerpts
Highly Influenced

Deterministic Blocker Tag Detection Scheme by Comparing Expected and Observed Slot Status in UHF RFID Inventory Management Systems

2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS) • 2014
View 5 Excerpts
Highly Influenced

Detect and identify blocker tags in tree-based RFID systems

2013 IEEE International Conference on Communications (ICC) • 2013
View 7 Excerpts
Highly Influenced

Block the blocker: A blocker-tag agnostic ALOHA-based tag reading protocol in dense RFID system

2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS) • 2014
View 4 Excerpts
Highly Influenced

RFID cardinality estimation with blocker tags

2015 IEEE Conference on Computer Communications (INFOCOM) • 2015
View 1 Excerpt

Performance Analysis of RFID Protocols: CDMA Versus the Standard EPC Gen-2

IEEE Transactions on Automation Science and Engineering • 2014
View 1 Excerpt

A Cube Based Model for RFID Coverage Problem in Three-Dimensional Space

2013 IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks • 2013

References

Publications referenced by this paper.
Showing 1-10 of 49 references

RFID security and privacy: a research survey

IEEE Journal on Selected Areas in Communications • 2006
View 4 Excerpts
Highly Influenced

The blocker tag: selective blocking of RFID tags for consumer privacy

ACM Conference on Computer and Communications Security • 2003
View 10 Excerpts
Highly Influenced

Wal-Mart relaunches EPC RFID effort, starting with men’s jeans and basics

M. Roberti
RFID J. pp. 1–3, Jul. 2010 [Online]. Available: http://www/rfidjournal.com/article/view/7753 • 2010
View 1 Excerpt

DiSEL: A Distance Based Slot Selection Protocol for Framed Slotted ALOHA RFID Systems

2009 IEEE Wireless Communications and Networking Conference • 2009
View 1 Excerpt

Performance analysis of RFID generation-2 protocol

C. Wang, M. Daneshmand, K. Sohrabi, B. Li
IEEE Trans. Wireless Commun., vol. 8, no. 5, pp. 2592–2601, May 2009. VAHEDI et al.: PROBABILISTIC ANALYSIS OF BLOCKING ATTACK IN RFID SYSTEMS 817 • 2009
View 2 Excerpts

Similar Papers

Loading similar papers…