نتایج جستجو برای: rfid tags
تعداد نتایج: 24998 فیلتر نتایج به سال:
In 2004, Molnar and Wagner introduced a very appealing scheme dedicated to the identification of RFID tags. Their protocol relies on a binary tree of secrets which are shared – for all nodes except the leaves – amongst the tags. Hence the compromise of one tag also has implications on the other tags with whom it shares keys. We describe a new man-in-the-middle attack against this protocol which...
Radio Frequency Identification (RFID) became the most popular and used technology for items identification and tracking. Typical scenario of its application is a pallet of products bearing RFID tag, which passes by portal equipped with RFID antennas. In such scenario it is important to identify all tags as soon as possible. Access control mechanism widely used in RFID system is Dynamic Framed S...
Radio Frequency Identification (RFID) systems are being intensively used recently for automated identification. Every object can be detected as one form of an electronic code. At the beginning, the main purpose of RFID tag usage is meant to be an improvement of barcodes. Besides the fact that an RFID tag does not need line of sight to obtain its ID, the tag is also water and dirt resistant. Mor...
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Successful object identification is the primary objective of RFID technology (after all, the last two letters of the acronym “RFID” stand for “identification”). Yet, a recent major study by Wal-Mart has shown that object detection probability can be as low as 66%. In th...
Due to the stringent computational capabilities of low-cost RFID tags, several lightweight secure authentication protocols have been proposed for an RFID-based supply chain using bitwise operations. In this paper, we study vulnerabilities associated with operations by doing cryptanalysis a protocol tags. The like rotation and XOR show that is vulnerable tag, reader, node impersonation attacks. ...
RFID was first proposed as a technology for the automatic identification of objects. However, some recent RFID devices can provide additional objects information and can be used for other applications. Security requirement is essential in most of the applications. An essential research challenge is to provide efficient protection for RFID systems, in particular against tag cloning and informati...
Since Low-cost RFID tags have very limited hardware resources, it is difficult to implement an authentication protocol which uses heavy operations such as modern ciphers or hash functions. It has been presented some ultra-lightweight RFID authentication protocols for low-cost RFID tags by using very light operations. Recently, Jeon and Yoon proposed a new ultra-lightweight RFID authentication p...
A basic radio-frequency identification (RFID) tag is a small and inexpensive microchip that emits a static identifier in response to a query from a nearby reader. Basic tags of the “smart-label” variety are likely to serve as a next-generation replacement for barcodes. This would introduce a strong potential for various forms of privacy infringement, such as invasive physical tracking and inven...
Radio frequency identification (RFID) is a ubiquitous wireless technology which allows objects to be identified automatically. An RFID tag is a small electronic device with an antenna and has a unique serial number. Using RFID tags can simplify many applications and provide many benefits, but the privacy of the customers should be taken into account. A potential threat for the privacy of a user...
We propose a novel RFID infrastructure design, which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We show that an infrastructure for multi-purpose RFID tags to be used in different contexts can be implemented in a privacy-preserving manner. We address security attacks such as impersonation, tracking, and replay. We also introduce spatio-temporal a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید