{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T12:29:15Z","timestamp":1752668955068,"version":"3.37.3"},"reference-count":16,"publisher":"SAGE Publications","issue":"8","license":[{"start":{"date-parts":[[2012,8,1]],"date-time":"2012-08-01T00:00:00Z","timestamp":1343779200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"School of Electrical and Electronic Engineering"},{"DOI":"10.13039\/501100004595","name":"Universiti Sains Malaysia","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100004595","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Research University Grants"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2012,8,1]]},"abstract":"<jats:p> Low-cost radio frequency identification (RFID) tag is exposed to various security and privacy threats due to computational constraint. This paper proposes the use of both prevention and detection techniques to solve the security and privacy issues. A mutual authentication protocol with integration of tag's unique electronic fingerprint is proposed to enhance the security level in RFID communication. A lightweight cryptographic algorithm that conforms to the EPCglobal Class-1 Generation-2 standard is proposed to prevent replay attack, denial of service, and data leakage issues. The security of the protocol is validated by using formal analysis tool, AVISPA. The received power of tag is used as a unique electronic fingerprint to detect cloning tags. t-test algorithm is used to analyze received power of tag at single-frequency band to distinguish between legitimate and counterfeit tag. False acceptance rate (FAR), false rejection rate (FRR), receiver operating characteristic (ROC) curve, and equal error rate (EER) were implemented to justify the robustness of t-test in detecting counterfeit tags. Received power of tag at single frequency band that was analyzed by using t-test was proved to be able to detect counterfeit tag efficiently as the area under the ROC curve obtained is high (0.922). <\/jats:p>","DOI":"10.1155\/2012\/891584","type":"journal-article","created":{"date-parts":[[2012,8,8]],"date-time":"2012-08-08T21:09:48Z","timestamp":1344460188000},"page":"891584","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":8,"title":["Prevention and Detection Methods for Enhancing Security in an RFID System"],"prefix":"10.1177","volume":"8","author":[{"given":"Jing Huey","family":"Khor","sequence":"first","affiliation":[{"name":"Auto-ID Laboratory, School of Electrical and Electronic Engineering, Universiti Sains Malaysia (USM), 14300 Nibong Tebal, Penang, Malaysia"}]},{"given":"Widad","family":"Ismail","sequence":"additional","affiliation":[{"name":"Auto-ID Laboratory, School of Electrical and Electronic Engineering, Universiti Sains Malaysia (USM), 14300 Nibong Tebal, Penang, Malaysia"}]},{"given":"Mohammad Ghulam","family":"Rahman","sequence":"additional","affiliation":[{"name":"Auto-ID Laboratory, School of Electrical and Electronic Engineering, Universiti Sains Malaysia (USM), 14300 Nibong Tebal, Penang, Malaysia"}]}],"member":"179","published-online":{"date-parts":[[2012,8,8]]},"reference":[{"first-page":"303","volume-title":"Proceeding of Security and Cryptography for Networks","author":"Bailey D.","key":"B1-2012-891584"},{"key":"B2-2012-891584","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2006.04.004"},{"key":"B3-2012-891584","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-010-0162-6"},{"key":"B4-2012-891584","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.94"},{"first-page":"199","volume-title":"Proceedings of the USENIX Security Symposium","author":"Danev B.","key":"B5-2012-891584"},{"key":"B6-2012-891584","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-008-0281-8"},{"key":"B7-2012-891584","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIAS.2006.295432"},{"key":"B8-2012-891584","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352556"},{"volume-title":"Proceedings of the 4th Workshop on RFID Security","author":"Song B.","key":"B9-2012-891584"},{"volume-title":"Proceedings of the 4th Workshop on RFID Security","author":"Burmester M.","key":"B10-2012-891584"},{"key":"B11-2012-891584","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2008.10.022"},{"key":"B12-2012-891584","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.56"},{"key":"B13-2012-891584","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860035"},{"volume-title":"Proceeding of 11th Pacific-Asia Conference on Knowledge Discovery and Data Mining","author":"Zhou J.","key":"B15-2012-891584"},{"key":"B16-2012-891584","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2010.11.003"},{"key":"B17-2012-891584","doi-asserted-by":"publisher","DOI":"10.1016\/j.arth.2008.05.026"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2012\/891584","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2012\/891584","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2012\/891584","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T17:42:15Z","timestamp":1622223735000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2012\/891584"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,1]]},"references-count":16,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2012,8,1]]}},"alternative-id":["10.1155\/2012\/891584"],"URL":"https:\/\/doi.org\/10.1155\/2012\/891584","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2012,8,1]]}}}