A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is
Detect and identify blocker tags in tree-based RFID systems
2013 IEEE International Conference on Communications (ICC)
Blocker tags are initially introduced to protect regular tags in certain ID ranges, called blocking ranges, from unwanted scanning in RFID systems. But if misused, blocker tags can cause blocking attacks that corrupt the communication between interfered regular tags and readers. Previous approaches can only detect blocking behavior. However, they cannot distinguish malicious blocking from legitimate blocking that can be perfectly allowed to protect customer's privacy. To solve the problem, wedoi:10.1109/icc.2013.6654842 dblp:conf/icc/WangXBS13 fatcat:lfh4lo55bzds3m5fm5w52bwwuu