Secure Authentication Protocol of RFID System Based on Access Control
نویسندگان
چکیده
منابع مشابه
Secure Improved Cloud-Based RFID Authentication Protocol
Although Radio Frequency IDentification (RFID) systems promise a fruitful future, security and privacy concerns have affected the adoption of the RFID technology. Several studies have been proposed to tackle the RFID security and privacy concerns under the assumption that the server is secure. In this paper, we assume that the server resides in the cloud that might be insecure, thus the tag’s d...
متن کاملA Secure Mutual Authentication Protocol for Low-cost RFID System
With extended data storage space and advanced wireless transmission capability, Radio Frequency IDentification (RFID) is rapidly deployed to replace barcode position in our daily lives and considered as the next generation identification technology in ubiquitous communication environment. The most important key factor of RFID technology is to enable systems with the ability to automatically ide...
متن کاملSecure and Scalable RFID Authentication Protocol
The radio frequency identification (RFID) enables identifying an object remotely via radio waves. This feature has been used in a huge number of applications, reducing dramatically the costs in some production processes. Nonetheless, it also poses serious privacy and security risks to them. Thus, researchers have presented secure schemes that prevent attackers from misusing the information whic...
متن کاملAn Authentication Protocol Based on Combined RFID-Biometric System RFID-Biometric System
Radio Frequency Identification (RFID) and biometric technologies saw fast evolutions during the last years and which are used in several applications, such as access control. Among important characteristics in the RFID tags, we mention the limitation of resources (memory, energy, ...). Our work focuses on the design of a RFID authentication protocol which uses biometric data and which confirms ...
متن کاملQuasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol
In 2010, Yeh, Lo and Winata [1] proposed a process-oriented ultralightweight RFID authentication protocol. This protocol is claimed to provide strong security and robust privacy protection, while at the same time the usage of resources on tags is optimized. Nevertheless, in this paper we show how the protocol does not achieve any of its intended security objectives; the main result is that the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advanced Engineering Forum
سال: 2012
ISSN: 2234-991X
DOI: 10.4028/www.scientific.net/aef.6-7.1072