Research Article

Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems

Figure 1

We use a simple example, where each tag uses three hash functions to construct the Bloom filter, to illustrate the procedures of the interrogated tag identification.