메뉴 건너뛰기




Volumn , Issue , 2009, Pages 199-214

Physical-layer identification of RFID devices

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK LAYERS; SMART CARDS; TRANSPONDERS;

EID: 85066934773     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (160)

References (48)
  • 2
    • 85076302457 scopus 로고    scopus 로고
    • IBM JCOP family. ftp://ftp.software.ibm.com/software/ pervasive/info/JCOP Family.pdf.
    • IBM JCOP Family
  • 3
    • 85076291301 scopus 로고    scopus 로고
    • ICAO. http://www.icao.int/.
  • 6
    • 26444478592 scopus 로고    scopus 로고
    • RFID traceability: A multilayer problem
    • A. Patrick and M. Yung, Eds.,. of LNCS
    • AVOINE, G., AND OECHSLIN, P. RFID traceability: A multilayer problem. In Financial Cryptography (2005), A. Patrick and M. Yung, Eds., vol. 3570 of LNCS, pp. 125–140.
    • (2005) Financial Cryptography , vol.3570 , pp. 125-140
    • Avoine, G.1    Oechslin, P.2
  • 10
    • 0030135340 scopus 로고    scopus 로고
    • Effects of high-pass and low-pass spatial filtering on face identification
    • COSTEN, N., PARKER, D., AND CRAW, I. Effects of high-pass and low-pass spatial filtering on face identification. Perception & Psychophysics 58, 4 (1996), 602–612.
    • (1996) Perception & Psychophysics , vol.58 , Issue.4 , pp. 602-612
    • Costen, N.1    Parker, D.2    Craw, I.3
  • 11
    • 70549106758 scopus 로고    scopus 로고
    • Transient-based identification of wireless sensor nodes
    • DANEV, B., AND ČAPKUN, S. Transient-based identification of wireless sensor nodes. In Proc. ACM/IEEE IPSN (2009).
    • (2009) Proc. ACM/IEEE IPSN
    • Danev, B.1    Čapkun, S.2
  • 12
    • 49049105769 scopus 로고    scopus 로고
    • Design and implementation of PUF-based”unclonable” RFID ICs for anti-counterfeiting and security applications
    • DEVADAS, S., SUH, E., PARAL, S., SOWELL, R., ZIOLA, T., AND KHANDELWAL, V. Design and implementation of PUF-based”unclonable” RFID ICs for anti-counterfeiting and security applications. Proc. IEEE Intl. Conf. on RFID (2008), 58–64.
    • (2008) Proc. IEEE Intl. Conf. On RFID , pp. 58-64
    • Devadas, S.1    Suh, E.2    Paral, S.3    Sowell, R.4    Ziola, T.5    Khandelwal, V.6
  • 13
    • 33847330246 scopus 로고    scopus 로고
    • A lightweight RFID protocol to protect against traceability and cloning attacks
    • DIMITRIOU, T. A lightweight RFID protocol to protect against traceability and cloning attacks. In Proc. ICST SecureComm (2005).
    • (2005) Proc. ICST SecureComm
    • Dimitriou, T.1
  • 15
    • 0035388827 scopus 로고    scopus 로고
    • Characteristics of radio transmitter fingerprints
    • ELLIS, K., AND SERINKEN, N. Characteristics of radio transmitter fingerprints. Radio Science 36 (2001), 585–597.
    • (2001) Radio Science , vol.36 , pp. 585-597
    • Ellis, K.1    Serinken, N.2
  • 16
    • 70349363627 scopus 로고    scopus 로고
    • EPCGLOBAL. Architecture framework v. 1.2. standard, 2007. http://www.epcglobalinc.org/standards/architecture/architecture 1 2-framework-20070910.pdf.
    • (2007) Architecture Framework V. 1.2. Standard
  • 17
    • 35048859848 scopus 로고    scopus 로고
    • Strong authentication for RFID systems using the AES algorithm
    • M. Joye and J.-J. Quisquater, Eds.,. of LNCS
    • FELDHOFER, M., DOMINIKUS, S., AND WOLKERSTORFER, J. Strong authentication for RFID systems using the AES algorithm. In Workshop on Cryptographic Hardware and Embedded Systems (2004), M. Joye and J.-J. Quisquater, Eds., vol. 3156 of LNCS, pp. 357–370.
    • (2004) Workshop on Cryptographic Hardware and Embedded Systems , vol.3156 , pp. 357-370
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 18
    • 85076298790 scopus 로고    scopus 로고
    • Cloning ePassports without active authentication
    • GRUNWALD, L. Cloning ePassports without active authentication. In BlackHat (2006).
    • (2006) BlackHat
    • Grunwald, L.1
  • 20
    • 11144331561 scopus 로고    scopus 로고
    • Enhancing intrusion detection in wireless networks using radio frequency fingerprinting
    • HALL, J., BARBEAU, M., AND KRANAKIS, E. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting. In Proc. CIIT (2004).
    • (2004) Proc. CIIT
    • Hall, J.1    Barbeau, M.2    Kranakis, E.3
  • 22
    • 38049181728 scopus 로고    scopus 로고
    • Detecting rogue devices in bluetooth networks using radio frequency fingerprinting
    • HALL, J., BARBEAU, M., AND KRANAKIS, E. Detecting rogue devices in bluetooth networks using radio frequency fingerprinting. In Proc. CCN (2006).
    • (2006) Proc. CCN
    • Hall, J.1    Barbeau, M.2    Kranakis, E.3
  • 23
    • 0030357161 scopus 로고    scopus 로고
    • Wavelet based transmitter identification
    • HIPPENSTIEL, R., AND PAYAL, Y. Wavelet based transmitter identification. In Proc. ISSPA (1996).
    • (1996) Proc. ISSPA
    • Hippenstiel, R.1    Payal, Y.2
  • 24
    • 0033220737 scopus 로고    scopus 로고
    • Combining multiple matchers for a high security fingerprint verification system
    • JAIN, A., PRABHAKAR, S., AND CHEN, S. Combining multiple matchers for a high security fingerprint verification system. In Pattern Recognition Letters (1999).
    • (1999) Pattern Recognition Letters
    • Jain, A.1    Prabhakar, S.2    Chen, S.3
  • 25
    • 23944476196 scopus 로고    scopus 로고
    • Minimalist cryptography for low-cost RFID tags
    • C. Blundo and S. Cimato, Eds.,. of LNCS
    • JUELS, A. Minimalist cryptography for low-cost RFID tags. In Intl. Conf. on Security in Communication Networks (2004), C. Blundo and S. Cimato, Eds., vol. 3352 of LNCS, pp. 149–164.
    • (2004) Intl. Conf. On Security in Communication Networks , vol.3352 , pp. 149-164
    • Juels, A.1
  • 28
    • 77951595476 scopus 로고    scopus 로고
    • Unidirectional key distribution across time and space with applications to RFID security
    • JUELS, A., PAPPU, R., AND PARNO, B. Unidirectional key distribution across time and space with applications to RFID security. In Proc. 17th USENIX Security Symposium (2008), pp. 75–90.
    • (2008) Proc. 17th USENIX Security Symposium , pp. 75-90
    • Juels, A.1    Pappu, R.2    Parno, B.3
  • 29
    • 18744409344 scopus 로고    scopus 로고
    • The blocker tag: Selective blocking of RFID tags for consumer privacy
    • JUELS, A., RIVEST, R., AND SZYDLO, M. The blocker tag: Selective blocking of RFID tags for consumer privacy. In Proc. ACM CCS (2003), pp. 103–111.
    • (2003) Proc. ACM CCS , pp. 103-111
    • Juels, A.1    Rivest, R.2    Szydlo, M.3
  • 31
    • 70349157643 scopus 로고    scopus 로고
    • RFID-based supply chain partner authentication and key agreement
    • KERSCHBAUM, F., AND SORNIOTTI, A. RFID-based supply chain partner authentication and key agreement. In Proc. ACM WiSec (2009).
    • (2009) Proc. ACM WiSec
    • Kerschbaum, F.1    Sorniotti, A.2
  • 33
    • 85076294654 scopus 로고    scopus 로고
    • Reading ePassports with predictable document numbers
    • LAURIE, A. Reading ePassports with predictable document numbers. In news report (2006).
    • (2006) News Report
    • Laurie, A.1
  • 34
    • 85076301379 scopus 로고    scopus 로고
    • Cloning ePassports with active authentication enabled
    • M, W. Cloning ePassports with active authentication enabled. In What The Hack (2005).
    • (2005) What the Hack
  • 36
    • 0032634932 scopus 로고    scopus 로고
    • Computing the discrete-time analytic signal via FFT
    • MARPLE, S. Computing the discrete-time analytic signal via FFT. IEEE Trans. on Signal Processing 47, 9 (1999).
    • (1999) IEEE Trans. On Signal Processing , vol.47 , pp. 9
    • Marple, S.1
  • 40
    • 51349157157 scopus 로고    scopus 로고
    • Implications of radio fingerprinting on the security of sensor networks
    • RASSMUSSEN, K., AND CAPKUN, S. Implications of radio fingerprinting on the security of sensor networks. In Proc. SecureComm (2007).
    • (2007) Proc. SecureComm
    • Rassmussen, K.1    Capkun, S.2
  • 42
    • 21244457881 scopus 로고    scopus 로고
    • Multimodal biometrics: An overview
    • ROSS, A., AND JAIN, A. Multimodal biometrics: An overview. In Proc. EUSIPCO (2004).
    • (2004) Proc. EUSIPCO
    • Ross, A.1    Jain, A.2
  • 43
    • 1242298616 scopus 로고    scopus 로고
    • Improvement of transmitter identification system for low SNR transients
    • TEKBAS, O., URETEN, O., AND SERINKEN, N. Improvement of transmitter identification system for low SNR transients. In Electronic Letters (2004).
    • (2004) Electronic Letters
    • Tekbas, O.1    Ureten, O.2    Serinken, N.3
  • 44
    • 0029461389 scopus 로고
    • Transient analysis and genetic algorithms for classification
    • TOONSTRA, J., AND KISNER, W. Transient analysis and genetic algorithms for classification. In Proc. IEEE WESCANEX (1995).
    • (1995) Proc. IEEE WESCANEX
    • Toonstra, J.1    Kisner, W.2
  • 47
    • 85076311702 scopus 로고    scopus 로고
    • EPassports reloaded
    • VANBEEK, J. ePassports reloaded. In BlackHat (2008).
    • (2008) BlackHat
    • Vanbeek, J.1
  • 48
    • 71049133194 scopus 로고    scopus 로고
    • Identification of the defective transmission devices using the wavelet transform
    • WANG, B., OMATU, S., AND ABE, T. Identification of the defective transmission devices using the wavelet transform. IEEE PAMI 27, 6 (2005), 696–710.
    • (2005) IEEE PAMI , vol.27 , Issue.6 , pp. 696-710
    • Wang, B.1    Omatu, S.2    Abe, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.