Security and Communication Networks / 2017 / Article / Fig 2

Research Article

Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems

Figure 2

An example, where , is presented to illustrate the process of the construction of hash-selection vector.
(a) First round of slot assignment
(b) Second round of slot assignment
(c) Construction of hash-selection vector