نتایج جستجو برای: rfid authentication protocols

تعداد نتایج: 139141  

2012
Jia-Ning Luo Ming Hour Yang

Radio frequency identification (RFID), based on the MIT Auto-ID project [1], is a technology that uses wireless transmission to identify an object. RFID is seeing increased use in various industries as an alternative to the bar code. An RFID system consists of three components: the reader, the tag, and the back-end database. Some advantages of an RFID system are that it does not require direct ...

2008
Gyözö Gódor Mátyás Antal

The usage of the RFID technology is becoming more and more widespread, however, the systems are quite vulnerable regarding security aspects. The authentication protocols developed for computer networks are not suitable for RFID use, because the tags have very limited memory and computing capacity. New solutions are needed, which requires less operations and fewer messages. The lightweight proto...

Journal: :IOP Conference Series: Materials Science and Engineering 2019

Journal: :IACR Cryptology ePrint Archive 2016
Atakan Arslan Süleyman Kardas Sultan Aldirmaz Sarp Ertürk

Security and privacy concerns have been growing with the increased usage of the RFID technology in our daily lives. To mitigate these issues, numerous privacy-friendly authentication protocols have been published in the last decade. Random number generators (RNGs) are commonly used in RFID tags to provide security and privacy of RFID protocols. RNGs might be weak spot of a protocol scheme and m...

2014
Mehmet Hilal Özcanhan

Many RFID authentication protocols have been proposed for safe drug administration. Unfortunately, many of the proposed protocols have security weaknesses that put the safety and/or privacy of inpatients into danger. A recent protocol is analyzed in this work, which proves to be another such example. The secrets of the inpatient tag are exposed by software and a table created by the present aut...

Journal: :I. J. Network Security 2009
Tianjie Cao Peng Shen

Radio frequency identification (RFID) technologies have many advantages in applications such as object tracking and monitoring, ticketing, supply-chain management, contactless payment systems. However, the RFID system may bring about various security and privacy problems. In this paper we present our security analysis of the LAK protocol and the CWH protocol. First, we show that the LAK protoco...

Journal: :J. Network and Computer Applications 2011
Pedro Peris-Lopez Agustín Orfila Julio César Hernández Castro Jan C. A. van der Lubbe

During the last years many RFID authentication protocols have been proposed with major or minor success (van Deursen and Radomirović, 2008). Juels (2004) introduced a different and novel problem that aims to evidence that two tags have been simultaneously scanned. He called this kind of evidence a yoking-proof that is supposed to be verifiable offline. Then, some authors suggested the generaliz...

2011
Xuefei Leng Konstantinos Markantonakis

This thesis addresses the problem of providing secure protocols for the practical application of low cost Radio-Frequency Identification (RFID) tags. This is particularly challenging because the tags are limited in cryptographic functionality and general performance, but also when there is a need to read multiple tags in a range of practical environments whilst maintaining data privacy. Several...

2013
Jian Shen Jin Wang Yuan Mei Ilyong Chung

Privacy is a major concern in RFID systems, especially with widespread deployment of wireless enabled interconnected personal devices. In this paper, we consider privacy issues in RFID systems where the authorized readers must be able to identify tags without an adversary being able to trace them, and provide a formal security model for privacy in RFID system. Under this model, we analyze the r...

2010
Gildas Avoine Iwen Coisel Tania Martin

Privacy is one of the most important security concerns in radio frequency identification. The publication of hundred RFID-based authentication protocols during the last decade raised the need of designing a dedicated privacy model. An important step has been done with the model of Vaudenay that combines early models into a unified and powerful one. In particular, this model addresses the case w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید