Research Article
Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems
Figure 1
We use a simple example, where each tag uses three hash functions to construct the Bloom filter, to illustrate the procedures of the interrogated tag identification.