A Cross-Layer Solution to Improve Security and Privacy in RFID Systems

نویسندگان

  • Anne Wei
  • Benoît Geller
  • GuoZhi Wei
  • Selma Boumerdassi
  • Éric Renault
چکیده

Due to advances in silicon manufacturing technology, Radio Frequency Identification (RFID) systems are useful in many applications such as automobile immobilizers, animal tracking, payment systems, automatic toll collection and inventory management. As RFID systems use both radio and wire communication, security issues become a critical concern. However, even if security and privacy solutions have been proposed for the past several years, a important study about transmission error influence on security solutions is still missing. Indeed, all radio communications depend upon error transmission rate, particularly for exchanged security messages. As a result, transmission errors can degrade the reliability and the stability of some security solutions. This paper first discusses some existing security proposals for RFID systems; then, it focuses on the influence of transmission errors on these security proposals. Finally, we suggest a novel cross-layer architecture designed to improve the reliability of security and privacy solutions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhancing privacy of recent authentication schemes for low-cost RFID systems

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

A Cross - Layer Approach 0 Optimization of RFID Platforms : 24

RFID (Radio Frequency Identification) is a technology that uses radio frequency signals for purposes of identification and tracking of objects, humans or animals. Since it allows automated identification and potential new features such as sensing of environmental parameters, RFID is gaining preference over legacy identification technologies. RFID is also being implemented in future mobile termi...

متن کامل

Traceability improvements of a new RFID protocol based on EPC C1 G2

Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006