نتایج جستجو برای: protocol rfid
تعداد نتایج: 257823 فیلتر نتایج به سال:
Recently, Alomair et al. proposed the first UnConditionally Secure mutual authentication protocol for low-cost RFID systems(UCSRFID). The security of the UCS-RFID relies on five dynamic secret keys which are updated at every protocol run using a fresh random number (nonce) secretly transmitted from a reader to tags. Our results show that, at the highest security level of the protocol (security ...
Recently, Alomair et al. proposed the first UnConditionally Secure mutual authentication protocol for lowcost RFID systems(UCS-RFID). The security of the UCSRFID relies on five dynamic secret keys which are updated at every protocol run using a fresh random number (nonce) secretly transmitted from a reader to tags. Our results show that, at the highest security level of the protocol (security p...
Widespread attention is recently paid upon RFID system structure considering its ease of deployment over an extensive range of applications. Due to its several advantages, many technical articles are published to improve its capabilities over specific system implementations. Recently, a lightweight antide-synchronization RFID authentication protocol and a lightweight binding proof protocol to g...
In 2004, Ari Juels [1] proposed a Yoking-Proofs protocol for RFID systems. The aim is to permit tags to generate a proof which is verifiable off-line by a trusted entity even when the readers are potentially untrusted. However, we find that their protocol not only doesn’t possess the anonymity property but also suffers from both of the off-line and replay attacks. In 2006, Kirk H.M. Wong et al....
In this paper, we analyze the security of the RFID authentication protocol proposed by Choi et al. at SecUbiq 2005. They claimed that their protocol is secure against all possible threats considered in RFID systems. However, we show that the protocol is vulnerable to an impersonation attack. Moreover, an attacker is able to trace a tag by querying it twice, given the initial information from 2d...
Radio Frequency Identification (RFID) system poses serious security and privacy risks that must be carefully mitigated in order to realize the numerous benefits the technology has to offer. In this talk I am going to present different security issues required to secure a RFID system. I will also describe some desirable characteristics of RFID security protocols for use in operational distribute...
RFID systems that employ passive RFID tags, are run using lightweight protocols. The Gossamer protocol is a case in point. However, it is found that the Gossamer protocol uses rather simple operations, in order to ensure that the protocol is lightweight. This raises security concerns. A protocol based on the Sign/Logarithm number system to make it power-efficient, and the efficient use of one-d...
Background RFIDs have almost become ubiquitous such that one can find RFID readers installed in almost any location. These RFIDs follow a well-established protocol, Fig. 1, that is built on the fact that the RFID tags perform very simple processing that require very little power. Thus, the RFID tags do not have to perform any complex storage of energy and it is assumed it can perform all of the...
Medication errors can cause substantial harm to patients. Automated patient medication systems with RFID technology is purposely used to reduce the medication error, to improve the patient safety, to provide personalized patient medication and identification and also to provide counterfeit protection to the patients. In order to enhance medication safety for patients we propose a new dynamic ID...
Radio frequency identification (RFID) is used to identify, track, and manage tagged animate or inanimate objects automatically using wireless communication technology. A serious concern faced by RFID technology is the collisions that occur among tag responses when queried by a reader that limits system performance significantly. Collisions bring extra delay, a waste of bandwidth, and extra ener...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید