Article
Computer Science, Information Systems
Han Ding, Jinsong Han, Cui Zhao, Ge Wang, Wei Xi, Zhiping Jiang, Jizhong Zhao
Summary: This study introduces a physical-layer tag protection framework named Arbitrator2.0 to address new security attacks faced by RFID technology. By passively listening on RF channels and working as a normal reader, Arbitrator2.0 effectively reduces unauthorized access attacks and prevents eavesdropping.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2022)
Article
Computer Science, Information Systems
Cui Zhao, Zhenjiang Li, Han Ding, Wei Xi, Ting Liu, Ruowei Gui, Jinsong Han
Summary: This paper presents RF-Mehndi, a passive commercial RFID tag array formed identifier. The novel aspect of RF-Mehndi is that the backscattered signals by the tag array become user-dependent and unique when the user's fingertip touches on the tag array surface during communication. By enhancing the communication modality of personal cards using RF-Mehndi, the illegal use of lost or stolen cards can be prevented. This authentication method leverages unique phase features obtained from the changing circuit characteristics of nearby tags and the user's fingertip touching profile.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Mohd Shariq, Karan Singh, Chhagan Lal, Mauro Conti, Tayyab Khan
Summary: Internet of Things (IoT) technologies have rapidly evolved, and RFID technology is a core technology used in various IoT applications. However, privacy and security concerns in RFID systems have been reported. To address these issues, an Efficient, Secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS) is proposed, which effectively resists known attacks and provides high security at low cost.
Article
Computer Science, Hardware & Architecture
Ming Gao, YuBin Lu
Summary: This study proposes an ultra-lightweight RFID authentication protocol using XOR and circular left-rotation operations, which provides better security performance and higher efficiency to meet the authentication needs of IoT terminal devices.
JOURNAL OF SUPERCOMPUTING
(2022)
Article
Engineering, Electrical & Electronic
Fabio Bernardini, Alice Buffi, Daniele Fontanelli, David Macii, Valerio Magnago, Mirko Marracci, Andrea Motroni, Paolo Nepa, Bernardo Tellini
Summary: This article introduces a synthetic aperture radar (SAR) localization method for indoor positioning of ultrahigh-frequency (UHF)-radio frequency identification (RFID) tags, improving accuracy by combining phase data from multiple paths. Various combination approaches are investigated to enhance localization performance. The proposed method is validated through experimental analysis in an indoor scenario.
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT
(2021)
Article
Chemistry, Multidisciplinary
Miquel Moras, Carme Martinez-Domingo, Roger Escude, Cristian Herrojo, Ferran Paredes, Lluis Teres, Ferran Martin, Eloi Ramon
Summary: This paper presents an organic, fully recyclable and eco-friendly 20-bit inkjet-printed chipless RFID tag, which operates in the near field and is implemented using chains of resonant elements. The tag is read by displacing it over a resonator-loaded transmission line and each resonant element is interrogated by a harmonic signal tuned to the resonance frequency.
APPLIED SCIENCES-BASEL
(2021)
Article
Computer Science, Information Systems
Bing Zhang, Xu Hu, Shan Gao
Summary: RFID tags are susceptible to counterfeit attacks in supply chain scenarios, but existing hash-based schemes require knowledge of the embedded hash functions, which are usually unavailable in large scale systems. This letter proposes a novel group-based slot constraint (GSC) scheme for lightweight counterfeit tag detection in RFID-enabled supply-chain systems. GSC uses elaborately designed group hash functions to authenticate tags based on their slot correlation, offering evidence for identifying counterfeit tags with an abnormal slot index. The simulation results demonstrate that GSC achieves reliable accuracy without knowing the exact hash functions.
Article
Computer Science, Information Systems
Anjia Yang, Dutliff Boshoff, Qiao Hu, Gerhard P. Hancke, Xizhao Luo, Jian Weng, Keith Mayes, Konstantinos Markantonakis
Summary: The newly proposed efficient group authentication protocol can authenticate a group of tags simultaneously, significantly reducing authentication time and communication costs. Built on a symmetric key-based algorithm and bit-collision pattern technique, the protocol can authenticate the entire group within a short period and supports privacy-preserving property to prevent illegitimate tracking of tagged items.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Usman Ali, Mohd Yamani Idna Bin Idris, Mohamad Nizam Bin Ayub, Insaf Ullah, Ihsan Ali, Tarak Nandy, Muktar Yahuza, Nauman Khan
Summary: An efficient RFID authentication scheme based on hyperelliptic curve Signcryption is proposed in this paper, providing the required security features for the RFID system while being more efficient in terms of computational, communication, and storage overheads compared to recently proposed schemes.
Article
Computer Science, Information Systems
Xuan Liu, Jiangjin Yin, Shigeng Zhang, Bin Xiao, Bo Ou
Summary: By integrating micro-sensors on RFID tags to obtain environmental information, the sensor-augmented RFID system supports applications sensitive to the environment. In multi-reader systems, we proposed efficient protocols for collecting information from target tags, enabled by quickly detecting and silencing non-target tags and efficiently arranging the replying order of target tags. Our protocols significantly outperform existing protocols in terms of time-efficiency.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2021)
Article
Computer Science, Information Systems
Xia Wang, Jia Liu, Yanyan Wang, Xingyu Chen, Lijun Chen
Summary: Tag grouping in RFID systems assigns group IDs to inform tags of their group, improving inventory efficiency. This paper proposes a two-phase grouping scheme to address slot waste and data redundancy, increasing the efficiency through slot reuse and data compression. The best protocol presented here demonstrates a 51.9% improvement in time efficiency compared to existing methods.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2021)
Article
Computer Science, Information Systems
Tiantian Zhu, Zhengqiu Weng, Qijie Song, Yuan Chen, Qiang Liu, Yan Chen, Mingqi Lv, Tieming Chen
Summary: Mobile authentication is crucial for protecting user's private resources. Existing methods struggle to meet the requirements of security, privacy, and usability in real-world scenarios. To address these challenges, we propose EspialCog, a system that collects sensor data using an evolutionary stable participation game mechanism, minimizes noise through abnormality analysis, and authenticates ownership in real-time using an optimized LSTM model and enhanced SGD algorithm. Experimental results demonstrate significant improvements in efficiency, coverage rates, accuracy, and robustness in noisy environments.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2022)
Article
Computer Science, Information Systems
Jingyi Ning, Lei Xie, Chuyu Wang, Yanling Bu, Fengyuan Xu, Da-Wei Zhou, Sanglu Lu, Baoliu Ye
Summary: In this paper, we propose RF-Badge, a vital sign-based authentication scheme on human subjects using RFID technology to provide continuous, contactless, and non-intrusive services. By considering the movement effect from respiration and the reflection effect from organs, we build models and networks to extract and authenticate the vital sign features of users. The experimental results show that our system achieves a low false positive rate of 3.9% and false negative rate of 3.3% for continuous authentication.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2023)
Article
Telecommunications
Shaohao Xie, Fangguo Zhang, Rong Cheng
Summary: The paper proposes a security-enhanced RFID authentication protocol for healthcare environment using the technique of indistinguishability obfuscation to prevent sensitive data leakage. The protocol is extended to fit the cloud environment and is scalable and practical, achieving most security properties of the RFID system.
WIRELESS PERSONAL COMMUNICATIONS
(2021)
Article
Computer Science, Hardware & Architecture
Mohd Shariq, Karan Singh
Summary: IoT technology is rapidly evolving, bringing significant innovation to daily life, but also posing risks to personal data. RFID tag connected devices face security and privacy issues.
JOURNAL OF SUPERCOMPUTING
(2021)
Article
Computer Science, Hardware & Architecture
Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe, Yang Xiang
Summary: With the rapid increase of cybersecurity attacks and their significant impact, the amount of cybersecurity-related information has surged. This article proposes an innovative cybersecurity retrieval scheme that uses semantic contents and hidden metadata for automatic indexing and searching of cybersecurity information. A novel cybersecurity search engine is implemented to demonstrate effective and understandable retrieval based on the proposed schema. Comprehensive performance evaluation is conducted on real-world datasets to validate the algorithms and techniques developed for cybersecurity information retrieval. This new engine enables augmented search, cybersecurity analytics, and visualization, aiming to provide direct and efficient results for obtaining and truly understanding cybersecurity information.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2023)
Article
Computer Science, Information Systems
Rongjunchen Zhang, Tingmin Wu, Sheng Wen, Surya Nepal, Cecile Paris, Yang Xiang
Summary: This article presents a novel chatbot model called SAM, which is based on Semantic Awareness Matching. SAM utilizes a two-layer matching network to capture similarity and semantic features in the context, and selects appropriate responses based on the matching probability of the two feature types.
ACM TRANSACTIONS ON INTERNET TECHNOLOGY
(2023)
Article
Geochemistry & Geophysics
Peng Lin, Suping Peng, Yang Xiang, Chuangjian Li, Xiaoqin Cui
Summary: A novel diffraction imaging approach combining the GMD algorithm and LSGDF technique is developed to effectively extract and separate continuous reflections and discontinuous diffractions. The proposed method enhances the resolving power of imaging subsurface geologic structures.
Article
Geochemistry & Geophysics
Peng Lin, Suping Peng, Chuangjian Li, Yang Xiang, Xiaoqin Cui
Summary: This study proposes a novel diffraction separation method using the Fourier-based geometric-mode decomposition (GMDF) algorithm to remove reflections and separate diffractions. The GMDF algorithm effectively represents reflections with linear geometric features by adaptively decomposing seismic data into band-limited modes, and the alternating direction method of the multipliers algorithm is used to solve the GMDF optimization problem. The method demonstrates good performance in removing strong reflections and separating weak diffractions, providing interpreters with detailed structural and stratigraphic information.
Article
Automation & Control Systems
Junyang Qiu, Qing-Long Han, Wei Luo, Lei Pan, Surya Nepal, Jun Zhang, Yang Xiang
Summary: This article presents a new multiview feature intelligence framework for recognizing evolving malware. The framework learns the representation of a targeted capability through processes like feature analysis, selection, aggregation, and encoding, to detect unknown malware with the same capability.
IEEE TRANSACTIONS ON CYBERNETICS
(2023)
Article
Geosciences, Multidisciplinary
Yang Xiang, Suping Peng
Summary: It has been found that small earthquakes can cause changes in the chemical composition and isotopic ratios of cold springs. By continuously monitoring the X10 spring and conducting water chemistry analysis and isotope methods, the study reveals that the changes in chemical ion concentrations and hydrogen-oxygen isotope ratios in the X10 spring are related to local seismic activity. The study suggests that hydrogen and oxygen stable isotopes are more sensitive to seismic activity than commonly used chemical constituents, and combined monitoring of isotopes and water chemistry should be considered in the future to capture hydrogeochemical precursor signals caused by earthquakes.
FRONTIERS IN EARTH SCIENCE
(2023)
Article
Automation & Control Systems
Xiaotao Feng, Xiaogang Zhu, Qing-Long Han, Wei Zhou, Sheng Wen, Yang Xiang
Summary: Internet of things (IoT) devices, accounting for 30% of all network-connected endpoints, pose security risks to companies and attract cybercriminals. Firmware security analysis is crucial to address these risks and protect vulnerable devices. However, the diversity of execution environments and closed source firmware make firmware security analysis challenging. This survey systematically reviews and analyzes research challenges and their solutions in firmware security analysis, introducing various methods and classifying them into four categories. The survey provides insights for software developers, cyber security researchers, and software security engineers.
IEEE-CAA JOURNAL OF AUTOMATICA SINICA
(2023)
Article
Computer Science, Information Systems
Hao Zhou, Geng Yang, Yang Xiang, Yunlu Bai, Weiya Wang
Summary: This paper proposes a novel lightweight matrix factorization for recommendations, which utilizes user local IoT devices for shard gradients training to address the resource-constrained issue in big data recommendations. A two-phase solution is designed to protect user data security and reduce item dimension, and a stabilization mechanism is introduced to decrease the scale of perturbed gradients. Experimental results show that the proposed scheme achieves good performance in terms of security, accuracy, and efficiency compared to other methods.
IEEE TRANSACTIONS ON BIG DATA
(2023)
Article
Computer Science, Hardware & Architecture
Jianghua Liu, Jian Yang, Wei Wu, Xinyi Huang, Yang Xiang
Summary: Recent advancements in IoT and cloud computing have accelerated the development of practical applications, including healthcare systems. However, the sensitive nature of healthcare IoT data and the resource constraints of IoT devices pose challenges for secure dissemination. To address these challenges, a lightweight and secure redactable signature scheme with coarse-grained additional redaction control (CRS) is proposed. The CRS provides security against forgery, redaction attacks, and linkability, with lower computational complexity and communication overhead compared to existing solutions.
IEEE TRANSACTIONS ON COMPUTERS
(2023)
Article
Computer Science, Hardware & Architecture
Lihong Tang, Tingmin Wu, Xiao Chen, Sheng Wen, Li Li, Xin Xia, Marthie Grobler, Yang Xiang
Summary: Behaviour analysis is crucial for the security verification of suspicious Android applications, but analysts often face significant obstacles. To address this issue, a visualisation tool called VisualDroid is developed based on apps' call graphs, which effectively lowers the barriers to Android behaviour and security analysis. Controlled experiments and a user study demonstrate that VisualDroid improves the effectiveness of behaviour analysis and security awareness.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2023)
Article
Medicine, General & Internal
Fengyan Wang, Kun Yang, Runsang Pan, Yang Xiang, Zhilin Xiong, Pinhao Li, Ke Li, Hong Sun
Summary: This study aimed to establish a glycometabolic gene signature to predict the prognosis of osteosarcoma patients and provide guidance for treatment selection. PRKACB, SEPHS2, GPX7, and PFKFB3 were identified as genes that can be used to construct the glycometabolic gene signature, which had a favorable performance in predicting the prognosis of osteosarcoma patients.
FRONTIERS IN MEDICINE
(2023)
Article
Energy & Fuels
Yan Dong, Yanan Zou, Xiang Li, Fuqiang Wang, Ziming Cheng, Weifeng Meng, Lingling Chen, Yang Xiang, Tong Wang, Yuying Yan
Summary: The idea of introducing a masking layer to prepare a water-based double-layer PDRC coating with high optical performance and thin thickness is proposed in this study. The PDRC coating achieved high solar reflectance and atmospheric transparent spectrum window emittance, with only 40% of the thickness and 60% of the cost compared to existing water-based PDRC coating. The coating demonstrated efficient cooling performance in large-scale outdoor applications and energy savings in container rooftops, providing compelling evidence for its ability to mitigate carbon emissions and address global climate change.
Article
Energy & Fuels
Dongsheng Liu, Yafei Liu, Enhui Bao, Xianglin Ren, Xiaohong Liu, Yang Xiang, Chunju Xu, Yi Li, Huiyu Chen
Summary: The study successfully prepared porous CuCo2O4/CuO microspheres and nanosheets using different methods. These materials exhibited battery-like features and excellent electrochemical performance, indicating great potential for electrochemical energy storage.
JOURNAL OF ENERGY STORAGE
(2023)
Article
Computer Science, Hardware & Architecture
Yanmei Cao, Jianghong Wei, Yang Xiang, Willy Susilo, Xiaofeng Chen
Summary: Deniable encryption (DE) allows private communication even when adversaries force participants to reveal their secret keys. However, existing DE systems do not consider potential abuse by malicious users. This paper proposes an abuse-resistant DE scheme and provides formal definitions and security analysis. The proposed scheme outperforms existing work in terms of functionality and ciphertext rate.
COMPUTER STANDARDS & INTERFACES
(2024)
Article
Computer Science, Theory & Methods
Huacheng Li, Chunhe Xia, Tianbo Wang, Sheng Wen, Chao Chen, Yang Xiang
Summary: Studying information diffusion in SNS is significant for both academia and industry. It contributes to the development of subjects like statistics, sociology, and data mining in theory, and provides fundamental support for downstream applications such as public opinion monitoring, rumor source identification, and viral marketing in practice. This survey investigates and summarizes emerging works in diffusion modeling, including a unified concept, methodologies, classification, comparative studies, representative models, and open issues.
ACM COMPUTING SURVEYS
(2023)