نتایج جستجو برای: rfid authentication protocol

تعداد نتایج: 283411  

2007
Hui-Feng Huang

Recently, as low-cost radio frequency identification (RFID) becomes more pervasive in our daily lives, RFID systems may create new threats to security and privacy of individuals and organizations. It must have secure mutual authentication mechanisms to protect privacy information. However, the previous works on designing security protocols for RFID either do not conform to the EPCglobal Class 1...

2013
Daisuke Moriyama Miyako Ohkubo Shin'ichiro Matsuo

In this paper, we propose a new variant of indistinguishabilitybased security model for the RFID authentication protocol, which allows an adversary to obtain an authentication result and secret key of a target tag. Ng et al. showed that symmetric-key based RFID authentication protocols cannot be resilient to the above information leakage simultaneously in the Paise-Vaudenay security model. We r...

2006
HangRok Lee DoWon Hong

Since communications between tag and reader in RFID system are by radio, anyone can access the tag and obtain its any information. And a tag always replies with the same ID so that it is hard to distinguish between a real and a fake tag. Thus, there are many security problems in today’s RFID System. Firstly, unauthorized reader can easily read the ID information of any Tag. Secondly, Adversary ...

2006
Youngjoon Seo Hyunrok Lee Kwangjo Kim

RFID (Radio Frequency Identification) is recently becoming popular, promising and widespread. In contrast, RFID tags can bring about traceability that causes user privacy and reduces scalability of RFID. Guaranteeing untraceability and scalability at the same time is so critical in order to deploy RFID widely since user privacy should be guaranteed. A large number of RFID protocols were designe...

2007
Divyan M. Konidala Zeen Kim Kwangjo Kim

Cloned fake RFID tags and malicious RFID readers pose a major threat to RFID-based supply chain management system. Fake tags can be attached to counterfeit products and medicines. Malicious readers can corrupt and snoop on genuine tags. These threats can be alleviated by incorporating a RFID tag-reader mutual authentication scheme. In this paper we propose a simple, cost-effective, light-weight...

2013
Süleyman Kardaş Serkan Çelik Mehmet Sariyüce Albert Levi

Radio Frequency IDentification based systems are getting pervasively deployed in many real-life applications in various settings for identification and authentication of remote objects. However, the messages that are transmitted over a insecure channel, are vulnerable to security and privacy concerns such as data privacy, location privacy of tag owner and etc. Recently, Yeh et al.’s proposed a ...

2015
Shugo Mikami Dai Watanabe Yang Li Kazuo Sakiyama

Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, privacy-preserving authentication protocols based on cryptographic algorithms have been designed. However, to the best of our knowledge, evaluation of ...

2009
MIKE BURMESTER JORGE MUNILLA

We propose a lightweight RFID authentication protocol that supports forward and backward security. The only cryptographic mechanism that this protocol uses is a pseudo-random number generator (PRNG) that is shared with the backend Server. Authentication is achieved by exchanging a few numbers (3 or 5) drawn from the PRNG. The protocol is optimistic with constant lookup time, and can be easily a...

2009
Xiaowen ZHANG Lin LEUNG Xiangdong LI

Radio Frequency Identi cation (RFID) authentication protocols are an active and important research topic and many protocols have been proposed. In this paper we examine two hash-function based low-cost authentication protocols, LCAP and OHLCAP, from GNY logic perspective with intention to nd out whether they are convincing that they have achieved their protocol goals. Our analysis shows that LC...

2014
Mehmet Hilal Özcanhan

Many RFID authentication protocols have been proposed for safe drug administration. Unfortunately, many of the proposed protocols have security weaknesses that put the safety and/or privacy of inpatients into danger. A recent protocol is analyzed in this work, which proves to be another such example. The secrets of the inpatient tag are exposed by software and a table created by the present aut...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید