نتایج جستجو برای: reader to tag collision
تعداد نتایج: 10630264 فیلتر نتایج به سال:
EPC class 1 Generation 2(or in short term EPC-C1 G2) is one of the most important standards for RFID passive tags. However, the original protocol known to be insecure. To improve the security of this standard, several protocols have been proposed compliant to this standard. In this paper we analyze the improved Yeh et al. ’s protocol by Yoon which is conforming to EPC-C1 G2 standard and is one ...
Current research in RFID security focuses on basic authentication protocols between a tag and a reader. In this paper, we claim that, in future, different new RFID-based scenarios will play an increasing role. In particular, we propose two new research directions: 1. Multi-Tag Security, and 2. RFID-based Payment. In multi-tag security, multiple tags try to jointly compute an information while u...
A main application in radio frequency identification (RFID) sensor networks is the function that processes real-time tag information after gathering the required data from multiple RFID tags. The component technologies that contain an RFID reader, called the interrogator, which has a tag chip, processors, coupling antenna, and a power management system have advanced significantly over the last ...
Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical. Some use hash functions instead of the more hardware efficient symmetric encryption schemes as a cryptographic primitive. Others incur a rather large time penalty at the reader side, because the reader has to perform a key search over large tag key space. Moreover, they do not allow for d...
This paper presents a design of RFID reader antenna, which is equipped on a chipattaching machine producing the RFID tags. Such an antenna is constrained to read exclusively one tag only for the purpose of functional check of the whole tag when it passes the reader antenna, namely, the other neighbour tags on the same rolling band are ignored that time. A wideband microstrip antenna is designed...
Radio Frequency Identification (RFID) system uses the principle of radiative power transfer between the reader and the tag antenna. The main performance metric for RFID system is the reliable reading coverage, where the tag can be read with higher detection probability. Most of current researches consider the reader coverage to be determined only by its read range assuming monostatic configurat...
Mutual authentication mechanisms can be used in RFID systems to preserve the confidentiality of the RFID tags. Hiding the unique IDs of the tags is critical to prevent unauthorized tag tracking. In this paper, we analyze two mutual authentication protocols called MAP and EMAP, recently proposed by Peris-Lopez et. al. We show that a passive adversary eavesdropping on the open wireless medium, ca...
With the ability of recognizing tag content wirelessly within a limited distance and a short period of query time, RFID technology has been adopted and deployed on various applications. In consequence, how to effectively avoid responses collision from multiple tags and to further reduce the average query time per tag becomes an important performance issue for RFID systems. To get better perform...
The RFID is one of the representative wireless identification systems. Due to more complicated data management and faster processing speed, the RFID system has been widely employed. Compared to the battery embedded active tag, the passive tag has many advantages, such as a long life time, a small size, and a low cost [1]. But the passive tag must harvest its operational energy from the radiated...
Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather costly key search time penalty at the reader. Moreover, they do not allow for dynamic, fine-grained access cont...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید