{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T00:40:09Z","timestamp":1749688809866,"version":"3.41.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491509"},{"type":"electronic","value":"9783319491516"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49151-6_20","type":"book-chapter","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T02:09:46Z","timestamp":1478225386000},"page":"284-299","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Physical-Layer Identification of HF RFID Cards Based on RF Fingerprinting"],"prefix":"10.1007","author":[{"given":"Guozhu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Luning","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Shijie","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Yafei","family":"Ji","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,5]]},"reference":[{"key":"20_CR1","unstructured":"Traub, K., Allgair, G., Barthel, H., Burstein, L., Garrett, J., Hogan, B., Rodrigues, B., Sarma, S., Schmidt, J., Schramek, C., et al.: The EPCglobal architecture framework. In: EPCglobal Ratified Specification (2005)"},{"key":"20_CR2","unstructured":"Huang, C.-H., Huang, S.-C.: RFID systems integrated OTP security authentication design. In: Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2013 Asia-Pacific, pp. 1\u20138. IEEE (2013)"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Abughazalah, S., Markantonakis, K., Mayes, K.: Enhancing the key distribution model in the RFID-enabled supply chains. In: 2014 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 871\u2013878. IEEE (2014)","DOI":"10.1109\/WAINA.2014.135"},{"key":"20_CR4","unstructured":"Grunwald, L.: New attack to RFID-systems and their middleware and backends. Black Hat Briefings, USA (2006)"},{"key":"20_CR5","first-page":"1","volume":"9","author":"MC OConnor","year":"2006","unstructured":"OConnor, M.C.: Industry group says e-passport clone poses little risk. RFID J. 9, 1\u20132 (2006)","journal-title":"RFID J."},{"key":"20_CR6","unstructured":"Westhues, J.: Hacking the prox card. In: RFID: Applications, Security, and Privacy, pp. 291\u2013300 (2005)"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Hui, L., Yahui, D., Dongsheng, L., Zilong, L., Dawei, H., Hengqing, T.: A lattice-based public-key encryption scheme for RFID applications. In: 2014 12th IEEE International Conference on Solid-State and Integrated Circuit Technology (ICSICT), pp. 1\u20133. IEEE (2014)","DOI":"10.1109\/ICSICT.2014.7021599"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO 1999","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). doi: 10.1007\/3-540-48405-1_25"},{"key":"20_CR9","unstructured":"Danev, B., Heydt-Benjamin, T.S., Capkun, S.: Physical-layer identification of RFID devices. In: USENIX Security Symposium, pp. 199\u2013214 (2009)"},{"issue":"2","key":"20_CR10","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/2240276.2240278","volume":"15","author":"B Danev","year":"2012","unstructured":"Danev, B., Capkun, S., Masti, R.J., Benjamin, T.S.: Towards practical identification of HF RFID devices. ACM Trans. Inf. Syst. Secur. (TISSEC) 15(2), 7 (2012)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"6","key":"20_CR11","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1109\/TDSC.2010.56","volume":"8","author":"SCG Gounder","year":"2011","unstructured":"Gounder, S.C.G., Thompson, D.R., Di, J.: Fingerprinting RFID tags. IEEE Trans. Dependable Secure Comput. 8(6), 938\u2013943 (2011)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"20_CR12","first-page":"230","volume":"39","author":"Y Honglin","year":"2009","unstructured":"Honglin, Y., Aiqun, H.: Fountainhead and uniqueness of RF fingerprint. J. SE Univ. (Nat. Sci. Ed.) 39(2), 230\u2013233 (2009)","journal-title":"J. SE Univ. (Nat. Sci. Ed.)"},{"key":"20_CR13","unstructured":"Periaswamy, S.C.G., Thompson, D.R., Romero, H.P., Di, J.: Fingerprinting radio frequency identification tags using timing characteristics. In: Proceedings of Workshop on RFID Security-RFID-sec Asia (2010)"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Hasse, J., Gloe, T., Beck, M.: Forensic identification of GSM mobile phones. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, pp. 131\u2013140. ACM (2013)","DOI":"10.1145\/2482513.2482529"},{"issue":"1","key":"20_CR15","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TR.2014.2372432","volume":"64","author":"HJ Patel","year":"2015","unstructured":"Patel, H.J., Temple, M.A., Baldwin, R.O.: Improving zigbee device network authentication using ensemble decision tree classifiers with radio frequency distinct native attribute fingerprinting. IEEE Trans. Reliab. 64(1), 221\u2013233 (2015)","journal-title":"IEEE Trans. Reliab."},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-642-22263-4_6","volume-title":"Privacy Enhancing Technologies","author":"D Zanetti","year":"2011","unstructured":"Zanetti, D., Sachs, P., Capkun, S.: On the practicality of UHF RFID fingerprinting: how real is the RFID tracking problem? In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 97\u2013116. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-22263-4_6"},{"issue":"5","key":"20_CR17","doi-asserted-by":"publisher","first-page":"1383","DOI":"10.1109\/TMTT.2009.2017318","volume":"57","author":"HP Romero","year":"2009","unstructured":"Romero, H.P., Remley, K.A., Williams, D.F., Wang, C.-M.: Electromagnetic measurements for counterfeit detection of radio frequency identification cards. IEEE Trans. Microw. Theor. Tech. 57(5), 1383\u20131387 (2009)","journal-title":"IEEE Trans. Microw. Theor. Tech."},{"issue":"7","key":"20_CR18","doi-asserted-by":"publisher","first-page":"1758","DOI":"10.1109\/TMTT.2010.2049773","volume":"58","author":"HP Romero","year":"2010","unstructured":"Romero, H.P., Remley, K.A., Williams, D.F., Wang, C.-M., Brown, T.X.: Identifying RF identification cards from measurements of resonance and carrier harmonics. IEEE Trans. Microw. Theor. Tech. 58(7), 1758\u20131765 (2010)","journal-title":"IEEE Trans. Microw. Theor. Tech."},{"issue":"9","key":"20_CR19","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MCOM.2007.4342873","volume":"45","author":"V Chawla","year":"2007","unstructured":"Chawla, V., Ha, D.S.: An overview of passive RFID. IEEE Commun. Mag. 45(9), 11\u201317 (2007)","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"20_CR20","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/TIFS.2011.2160170","volume":"7","author":"WE Cobb","year":"2012","unstructured":"Cobb, W.E., Laspe, E.D., Baldwin, R.O., Temple, M.A., Kim, Y.C.: Intrinsic physical-layer authentication of integrated circuits. IEEE Trans. Inf. Forensics Secur. 7(1), 14\u201324 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"16","key":"20_CR21","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1049\/el.2010.1220","volume":"46","author":"HL Yuan","year":"2010","unstructured":"Yuan, H.L., Hu, A.Q.: Preamble-based detection of Wi-Fi transmitter RF fingerprints. Electron. lett. 46(16), 1165\u20131167 (2010)","journal-title":"Electron. lett."},{"key":"20_CR22","volume-title":"Discrete-Time Signal Processing","author":"AV Oppenheim","year":"1989","unstructured":"Oppenheim, A.V., Schafer, R.W., Buck, J.R., et al.: Discrete-Time Signal Processing, vol. 2. Prentice hall, Englewood Cliffs (1989)"},{"issue":"12","key":"20_CR23","doi-asserted-by":"publisher","first-page":"4843","DOI":"10.1109\/TIE.2011.2179276","volume":"59","author":"C Bertoncini","year":"2012","unstructured":"Bertoncini, C., Rudd, K., Nousain, B., Hinders, M.: Wavelet fingerprinting of radio-frequency identification (RFID) tags. IEEE Trans. Ind. Electron. 59(12), 4843\u20134850 (2012)","journal-title":"IEEE Trans. Ind. Electron."},{"key":"20_CR24","unstructured":"Bishop, C.M.: Pattern recognition. Mach. Learn. 128 (2006)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49151-6_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T00:00:54Z","timestamp":1749686454000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49151-6_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491509","9783319491516"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49151-6_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"5 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Practice and Experience","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zhangjiajie","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispec2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}