On addressing RFID/NFC-based relay attacks: An overview.
Yu-Ju TuSelwyn PiramuthuPublished in: Decis. Support Syst. (2020)
Keyphrases
- low cost
- countermeasures
- mobile phone
- watermarking scheme
- supply chain
- data collection
- mobile devices
- rfid technology
- malicious users
- radio frequency identification
- rfid systems
- security protocols
- security threats
- traffic analysis
- security risks
- rfid reader
- chosen plaintext
- current status
- supply chain management
- base station
- cryptographic protocols
- multi hop
- watermarking algorithm
- terrorist attacks
- smart phones