نتایج جستجو برای: protocol rfid

تعداد نتایج: 257823  

Journal: :Wireless Personal Communications 2018
Süleyman Kardas Ziya Alper Genç

Radio Frequency IDentification (RFID) technology has been increasingly integrated into numerous applications for authentication of objects or individuals. However, because of its limited computation power, RFID technology may cause several security and privacy issues such as tracking the owner of the tag, cloning of the tags and etc. Recently, two chaotic map-based authentication protocols have...

2012
Ramzi Bassil Wissam El-Beaino Wassim Itani Ayman Kayssi Ali Chehab

Radio Frequency Identification (RFID) is a technology used for automatic identification of objects, people, and virtually anything one can think of. Applications of RFID technology are expanding and its usage is being adopted worldwide. As such, major efforts have been made to secure the communications in RFID systems and to protect them from various attacks. This paper surveys RFID systems, ci...

2009
Ton van Deursen Sjouke Mauw Sasa Radomirovic Pim Vullers

Radio frequency identification (RFID) is an upcoming technology with a large potential, but it also introduces a number of threats. Ownership transfer has been introduced to mitigate the risks which are caused by changes in ownership of RFID tags. We present formal definitions for ownership and ownership transfer in RFID systems and their secure variants. These definitions can be used to verify...

Journal: :I. J. Network Security 2016
Quan Qian Yan-Long Jia Rui Zhang

Radio Frequency Identification (RFID) is a promising new technology that is widely deployed for object tracking and monitoring, ticketing, supply-chain management, contactless payment, etc. However, RFID related security problems attract more and more attentions. This paper has studied a novel elliptic curve cryptography (ECC) based RFID security protocol and it shows some great features. First...

2014
Hyoungmin Ham Jooseok Song

A RFID (Radio Frequency Identification) yokingproof provides a verification manner that a pair of RFID tags is scanned simultaneously by one reader device to guarantee the physical proximity of multiple objects. However, the previous studies provide the verification that requires the online verifier. The connectivity between a reader and a verifier limits the practicality of a yoking proof. In ...

2012
Junsong Zhang Wendong Wang Jian Ma Xiong Li

RFID, capable of non-contact automatic identification using the small, low-cost RFID tags, is taking the place of barcodes to become electronic tags of the new generation. EPCglobal Class-1 Generation-2 specification (Gen2 in brief) has been approved as ISO18000-6C for global use, but the identity of tag (TID) is delivered in plaintext which makes insecurity. Several solutions have been propose...

2014
Masoud Mohammadi Mehdi Hosseinzadeh

Radio Frequency Identification (RFID) technology is a promising technology. It uses radio waves to identify objects. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. However, this ubiquitous technology has inherited problems in security and privacy. EPC Class 1 Generation 2 has serve...

2013
Wen-Tsai Ko Shin-Yan Chiou Erl-Huei Lu Henry Ker-Chang Chang

An RFID (Radio-Frequency IDentification) system provides the mechanism to identify tags to readers and then to execute specific RFID-enabled applications. In those applications, secure protocols using lightweight cryptography need to be developed and the privacy of tags must be ensured. In 2010, Batina et al. proposed a privacy-preserving grouping proof protocol for RFID based on ECC (Elliptic ...

2008
Eun-Jun Yoon Kee-Young Yoo

Due to the very limited computing resource, storing space and electric power supply of tag, it is a great challenge for us to design a practical RFID protocol which is security, efficient and can be used in the low-cost tag. In 2007, He et al. proposed an authentication and key agreement protocol which is used in the process of communication between the low-cost tag and reader. They also proved...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید