Emulated RFID Security without Extensive Cryptography

نویسندگان

  • B. Venkatalakshmi
  • V. Akilandeswari
  • Karthick Narayanan
چکیده

Radio Frequency Identification (RFID) has recently received a lot of focus as an augmentation Technology in the Ubiquitous Computing domain. RFID system uses Tags which are small, wireless devices that help in identifying objects and people. When read range permits, clandestine scanning of tags is a plausible threat. In consequence, a person carrying an RFID tag effectively broadcasts a fixed serial number to nearby readers providing a ready vehicle for clandestine physical tracking conventional cryptograp hic algorithms aiming to attack this problem are limited by the size and cost considerations. We propose an algorithm which is computationally simple mechanism since it requires simple matrix multiplication. The proposed algorithm is tested in an emulated RFID environment of HF and the results confirm the improved performance. Keywords—Radio Frequency Identification, Ubiquitous Computing Domain, Matrix Multiplication, RFID Environment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard

The EPC Class-1 Generation-2 RFID standard provides little security, as has been shown in previous works such as [S. Karthikeyan, M. Nesterenko, RFID security without extensive cryptography, in: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2005, pp. 63–67; D.N. Duc, J. Park, H. Lee, K. Kim, Enhancing security of EPCglobal Gen-2 RFID tag against traceability and...

متن کامل

Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

متن کامل

Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

متن کامل

Strengthen RFID Tags Security Using New Data Structure

RFID was first proposed as a technology for the automatic identification of objects. However, some recent RFID devices can provide additional objects information and can be used for other applications. Security requirement is essential in most of the applications. An essential research challenge is to provide efficient protection for RFID systems, in particular against tag cloning and informati...

متن کامل

Can Jannie verify? Usability of display-equipped RFID tags for security purposes

The recent emergence of RFID tags capable of performing public key operations enables a number of new applications in commerce (e.g., RFID-enabled credit cards) and security (e.g., ePassports and access-control badges). While the use of public key cryptography in RFID tags mitigates many difficult security issues, certain important usability-related issues remain, particularly when RFID tags ar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008