نتایج جستجو برای: reader to tag collision

تعداد نتایج: 10630264  

Journal: :IACR Cryptology ePrint Archive 2011
Masoumeh Safkhani Nasour Bagheri Somitra Kumar Sanadhya Majid Naderi

EPC class 1 Generation 2(or in short term EPC-C1 G2) is one of the most important standards for RFID passive tags. However, the original protocol known to be insecure. To improve the security of this standard, several protocols have been proposed compliant to this standard. In this paper we analyze the improved Yeh et al. ’s protocol by Yoon which is conforming to EPC-C1 G2 standard and is one ...

2009
Erik-Oliver Blass Refik Molva

Current research in RFID security focuses on basic authentication protocols between a tag and a reader. In this paper, we claim that, in future, different new RFID-based scenarios will play an increasing role. In particular, we propose two new research directions: 1. Multi-Tag Security, and 2. RFID-based Payment. In multi-tag security, multiple tags try to jointly compute an information while u...

2011
Sang Hoon Lee Ik Soo Jin

A main application in radio frequency identification (RFID) sensor networks is the function that processes real-time tag information after gathering the required data from multiple RFID tags. The component technologies that contain an RFID reader, called the interrogator, which has a tag chip, processors, coupling antenna, and a power management system have advanced significantly over the last ...

Journal: :CoRR 2009
Jaap-Henk Hoepman Rieks Joosten

Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical. Some use hash functions instead of the more hardware efficient symmetric encryption schemes as a cryptographic primitive. Others incur a rather large time penalty at the reader side, because the reader has to perform a key search over large tag key space. Moreover, they do not allow for d...

2009
Chi-Fang Huang I-Feng Huang

This paper presents a design of RFID reader antenna, which is equipped on a chipattaching machine producing the RFID tags. Such an antenna is constrained to read exclusively one tag only for the purpose of functional check of the whole tag when it passes the reader antenna, namely, the other neighbour tags on the same rolling band are ignored that time. A wideband microstrip antenna is designed...

2014
Abdelmoula Bekkali Sicheng Zou Abdullah Kadri Richard Penty Ian White

Radio Frequency Identification (RFID) system uses the principle of radiative power transfer between the reader and the tag antenna. The main performance metric for RFID system is the reliable reading coverage, where the tag can be read with higher detection probability. Most of current researches consider the reader coverage to be determined only by its read range assuming monostatic configurat...

2007
Basel Alomair Loukas Lazos Radha Poovendran

Mutual authentication mechanisms can be used in RFID systems to preserve the confidentiality of the RFID tags. Hiding the unique IDs of the tags is critical to prevent unauthorized tag tracking. In this paper, we analyze two mutual authentication protocols called MAP and EMAP, recently proposed by Peris-Lopez et. al. We show that a passive adversary eavesdropping on the open wireless medium, ca...

Journal: :J. Inf. Sci. Eng. 2011
Kuo-Hui Yeh Nai-Wei Lo Enrico Winata

With the ability of recognizing tag content wirelessly within a limited distance and a short period of query time, RFID technology has been adopted and deployed on various applications. In consequence, how to effectively avoid responses collision from multiple tags and to further reduce the average query time per tag becomes an important performance issue for RFID systems. To get better perform...

2011
Mingeun Song Hyungchul Kim Min-Su Kim Youngoo Yang

The RFID is one of the representative wireless identification systems. Due to more complicated data management and faster processing speed, the RFID system has been widely employed. Compared to the battery embedded active tag, the passive tag has many advantages, such as a long life time, a small size, and a low cost [1]. But the passive tag must harvest its operational energy from the radiated...

2009
Rieks Joosten Jaap-Henk Hoepman

Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather costly key search time penalty at the reader. Moreover, they do not allow for dynamic, fine-grained access cont...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید