نتایج جستجو برای: rfid authentication protocols

تعداد نتایج: 139141  

Journal: :CoRR 2017
Lucca Hirschi David Baelde Stéphanie Delaune

In this paper, we consider the problem of verifying anonymity and unlinkability in the symbolic model,where protocols are represented as processes in a variant of the applied pi calculus, notably used in the ProVeriftool. Existing tools and techniques do not allow to verify directly these properties, expressed as behavioral equiv-alences. We propose a di erent approach: we design tw...

2013
Jung Tae Kim

A variety of security and privacy threats to RFID authentication protocols have been widely studied, including eavesdropping, replay attacks, denial of service (DoS) attacks, tracking, and traceability. Considering this RFID security issues, we surveyed the security threats and open problems related to issues by means of information security and privacy. In ubiquitous sensor node, it is possibl...

Journal: :I. J. Network Security 2015
Noureddine Chikouche Cherif Foudil Pierre-Louis Cayrel Mohamed Benmohammed

Among the embedded systems which were quickly developed during the last years and that were used in various domains (e.g. access control, health, ...) we can cite radio frequency identification (RFID). In this paper, we propose an improved mutual authentication protocol in RFID systems based on the randomized McEliece cryptosystem. The McEliece cryptosystem is not only very fast, but it is resi...

Journal: :Computer Communications 2009
Pedro Peris-Lopez Tieyan Li Julio César Hernández Castro Juan E. Tapiador

The EPC Class-1 Generation-2 RFID standard provides little security, as has been shown in previous works such as [S. Karthikeyan, M. Nesterenko, RFID security without extensive cryptography, in: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2005, pp. 63–67; D.N. Duc, J. Park, H. Lee, K. Kim, Enhancing security of EPCglobal Gen-2 RFID tag against traceability and...

2014
Chien-Ming Chen Shuai-Min Chen Xinying Zheng Pei-Yu Chen Hung-Min Sun

RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the ...

2011
M. Sandhya T. R. Rangaswamy

The integration of RFID technology and mobile smart device stimulates the daily increasing popularity of mobile RFID-based applications, which makes its way to become a new hot zone for research and development. Current RFID authentication schemes are not viable to use in mobile RFID environment. The authentication schemes result in computing load to the low cost tag and provide insufficient pr...

The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...

Journal: :CoRR 2015
Seyed Salman Sajjadi GhaemMaghami Mahtab Mirmohseni Afrooz Haghbin

Radio Frequency Identification (RFID) is a modern communication technology, which provides authentication and identification through a nonphysical contact. Recently, the use of this technology is almost developed in healthcare environments. Although RFID technology can prepare sagacity in systems, privacy and security issues ought to be considered before. Recently, in 2015, Li et al. proposed S...

2014
Qi Chai

RFID (Radio Frequency IDentification) technology has moved from academic obscurity into mainstream business and practice. Although this technology has many catching and exclusive characteristics, security and privacy issues associated are not easy to address due to tags’ modest computational and storage capabilities and the necessity to keep their prices low. This paper provides a general overv...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید