Institute of Electrical & Electronic Engineers
Tag cloning attacks threaten a variety of Radio Frequency IDentification (RFID) applications but are hard to prevent. To secure RFID applications that confine tagged objects in the same RFID system, this paper studies the cloned-tag identification problem. Although limited existing paper has shed some light on the problem, designing fast cloned-tag identification protocols for applications in large-scale RFID systems is yet not thoroughly investigated. To this end, the authors propose leveraging broadcast and collisions to identify cloned tags.