Security and Communication Networks / 2017 / Article / Fig 1

Research Article

Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems

Figure 1

We use a simple example, where each tag uses three hash functions to construct the Bloom filter, to illustrate the procedures of the interrogated tag identification.