نتایج جستجو برای: rfid authentication protocol

تعداد نتایج: 283411  

2011
G. Varun Reddy Srujan Raju

Epcglobal class-1 generation-2 has been approved by the ISO18000-6C for the global usage. Here the tag can be traceable and that is transmitted into the plain text . In traditional encryption methods we use symmetric or asymmetric ciphers but this encryption methods are not suitable for the RFID tags. Gen2 has proposed some lightweight authentication protocols. Here message flow in RFID tag is ...

2011
H. M. Sun K. H. Wang

There are increasing concerns on the security of RFID usages. Recently, Lu et al. presented ACTION, a privacy preservative authentication protocol for RFID. It is claimed that it achieves high level of security even if a large number of tags is compromised. However, we found that this protocol is vulnerable to two severe attacks: Desynchronizing attacks and Tracking attacks. In this paper, we p...

Journal: :IACR Cryptology ePrint Archive 2015
Da-Zhi Sun Zahra Ahmadian Yue-Jiao Wang Mahmoud Salmasizadeh Mohammad Reza Aref

As low-cost RFID tags become more and more ubiquitous, it is necessary to design ultralightweight RFID authentication protocols to prevent possible attacks and threats. We reevaluate Ahmadian et al.’s desynchronization attack on the ultralightweight RFID authentication protocol with permutation (RAPP). Our results are twofold: (1) we demonstrate that the probability of the desynchronization bet...

Journal: :Des. Codes Cryptography 2008
Jooyoung Lee Yongjin Yeom

In this paper, we introduce a new class of PRSGs, called partitioned pseudorandom sequence generators(PPRSGs), and propose an RFID authentication protocol using a PPRSG, called S-protocol. Since most existing stream ciphers can be regarded as secure PPRSGs, and stream ciphers outperform other types of symmetric key primitives such as block ciphers and hash functions in terms of power, performan...

Journal: :Journal of the Institute of Industrial Applications Engineers 2021

Flawed authentication protocols led to the need for a secured protocol radio frequency identification (RFID) techniques. In this paper, an named Modified ultralightweight mutual (MUMAP) has been proposed and cryptanalysed by Juel-Weis challenge. The aimed reduce memory requirements in process low-cost RFID tags with limited resources. Lightweight operations like XOR Left Rotation, are used circ...

2005
Shih-I Huang Shiuhpyng Shieh

In this paper, we propose a network architecture with RFIDs and sensor nodes (ARIES), a mutual authentication protocol (AMULET), and a secret search protocol (ASSART). In ARIES, the distance limitation can be relieved with the help of widely deployed RFID-aware sensor nodes. AMULET can perform mutual authentication and reduce the cost for re-authentication. ASSART solves the privacy problem by ...

Journal: :IACR Cryptology ePrint Archive 2013
Raghuvir Songhela Manik Lal Das

Radio Frequency IDentification (RFID) systems are gaining enormous interests at industry due to their vast applications such as supply chain, access control, inventory, transport, health care and home appliances. Although tag identification is the primary security goal of an RFID system, privacy issue is equally, even more, important concern in RFID system because of pervasiveness of RFID tags....

2009
Dang Nguyen Duc Kwangjo Kim

In Crypto’05, Juels and Weis proposed an efficient and provably secure authentication protocol for RFID devices, namely HB. The protocol is adapted from a human authentication protocol called HB which was proposed earlier by Hopper and Blum. Although HB is more secure than HB in order to be secure in a RFID environment, HB still suffers from an inherent weakness of HB. That is HB+ is not shown ...

Journal: :IACR Cryptology ePrint Archive 2016
Karim Baghery Behzad Abdolmaleki M. J. Emadi

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید