Author:
Ray Biplob,Khadka Grishma,Lasantha Dimuth,Chandrappa Varun,Choi Jinho,Karmakar Nemai
Publisher
Springer International Publishing
Reference45 articles.
1. B.R. Ray, M. Chowdhury, J. Abawajy, Critical analysis and comparative study of security for networked RFID systems, in 2013 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (2013), pp. 197–202. https://doi.org/10.1109/SNPD.2013.41
2. X. Chen, M. Lech, L. Wang, A complete key management scheme for LoRaWAN v1.1. Sensors (Basel) 21(9), 2962 (2021). https://doi.org/10.3390/s21092962
3. M. Frustaci, P. Pace, G. Aloi, G. Fortino, Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet Things J. 5(4), 2483–2495 (2018). https://doi.org/10.1109/JIOT.2017.2767291
4. J. Grosinger, W. Pachler, W. Bosch, Tag size matters: miniaturized RFID tags to connect smart objects to the internet. IEEE Microwave Mag. 19(6), 101–111 (2018). https://doi.org/10.1109/MMM.2018.2844029
5. R.E. Azim, R. Koswatta, N.C. Karmakar, P. Kalansuriya, Chipless radio frequency identification reader signal processing (John Wiley & Sons, Incorporated, Hoboken, 2016)