Cloud-based RFID access control using lightweight messaging protocol

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight RFID Protocol Using Substring

As low-cost RFIDs with limited resources will dominate most of the RFID market, it is imperative to design lightweight RFID authentication protocols for these low-cost RFIDs. However, most of existing RFID authentication protocols either suffer from some security weaknesses or require costly operations that are not available on low-cost tags. In this paper, we analyze the security vulnerabiliti...

متن کامل

Secure Improved Cloud-Based RFID Authentication Protocol

Although Radio Frequency IDentification (RFID) systems promise a fruitful future, security and privacy concerns have affected the adoption of the RFID technology. Several studies have been proposed to tackle the RFID security and privacy concerns under the assumption that the server is secure. In this paper, we assume that the server resides in the cloud that might be insecure, thus the tag’s d...

متن کامل

A Lightweight Messaging Protocol for Smart Grids

The smart grid concept introduces more software control at both endpoints of the energy consumption chain: The consumer is integrated into the grid management using smart metering, whereas the producer will be host to a distributed agent-based software approach. Including more renewable energy sources in the energy mix will increase the necessity for a finergrained, automatic control of changes...

متن کامل

Lightweight Directory Access Protocol

We survey the history, development and usage of directory services based on the Lightweight Directory Access Protocol (LDAP). We present a summary of the naming model, the schema model, the principal service models, and the main protocol interactions in terms of a C language application programming interface.

متن کامل

RFID Security Using Lightweight Mutual Authentication And Ownership Transfer Protocol

In recent years, radio frequency identification technology has moved into the mainstream applications that help to speed up handling of manufactured goods and materials. RFID tags are divided into two classes: active and passive. Active tag requires a power source that’s why its cost is more than passive tags. However, the low-cost RFID tags are facing new challenges to security and privacy. So...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Engineering Research and Science

سال: 2019

ISSN: 2349-6495,2456-1908

DOI: 10.22161/ijaers.6.1.2