نتایج جستجو برای: desynchronization attack

تعداد نتایج: 82948  

Journal: :J. Network and Computer Applications 2014
Lijun Gao Maode Ma Yantai Shu Yuhua Wei

Radio Frequency Identification (RFID) technology will become one of the most popular technologies to identify objects in the near future. However, the major barrier that the RFID system is facing presently is the security and privacy issue. Recently, an ultralightweight RFID authentication protocol with permutation has been proposed to provide security and prevent all possible attacks. However,...

Journal: :IACR Cryptology ePrint Archive 2015
Masoumeh Safkhani Hoda Jannati Nasour Bagheri

Over the past decade, besides authentication, ownership management protocols have been suggested to transfer or delegate the ownership of RFID tagged items. Recently, Niu et al. have proposed an authentication and ownership management protocol based on 16-bit pseudo random number generators and exclusive-or operations which both can be easily implemented on low-cost RFID passive tags in EPC glo...

2014
Lei He Yong Gan Yi-feng Yin

It was proposed a secure group ownership transfer protocol for tags in RFID system to transfer the ownership of multiple tags simultaneously. Old owner executes authentication and updates secrets of a group of tags. Afterwards, it sends the secrets updated to new owner in a secure way. New owner also implements authentication and update procedure with tags. The protocol was analyzed by using GN...

2015
Yong Gan Lei He Yi-feng Yin

Tag ownership transfer is an important process for RFID system. Besides the user needs to obtain the information concerning the quality of products in some scenarios, which are attached by tags. In this paper, we proposed an ownership transfer protocol with retrospective ability and analyzed its security level by using GNY logic. The results indicate that the ownership transfer protocol provide...

Journal: :IACR Cryptology ePrint Archive 2013
Umar Mujahid M.Najam-ul-islam Jameel Ahmed Usman Mujahid Tieyan Li Hung-Min Sun Wei-Chih Ting

Radio frequency identification (RFID) technology is one of the most emerging technologies in the field of pervasive systems, which provides the automatic identification of the object with non-line of sight capability. RFID is much better than its contending identification scheme (Bar code) in terms of efficiency and functional haste. Although it offers many advantages over other identification ...

Journal: :Journal of the Institute of Industrial Applications Engineers 2021

Flawed authentication protocols led to the need for a secured protocol radio frequency identification (RFID) techniques. In this paper, an named Modified ultralightweight mutual (MUMAP) has been proposed and cryptanalysed by Juel-Weis challenge. The aimed reduce memory requirements in process low-cost RFID tags with limited resources. Lightweight operations like XOR Left Rotation, are used circ...

Journal: :IACR Cryptology ePrint Archive 2011
Masoumeh Safkhani Nasour Bagheri Majid Naderi

In this paper we consider the security of a PUF based RFID Authentication protocol which has been recently proposed by Bassil et al. [2]. The designers have claimed that their protocol offers immunity against a broad range of attacks while it provides excellent performance. However, we prove in contrary to its designers claim, this protocol does not provide any security. We present an efficient...

Journal: :CoRR 2011
Mohammad Hassan Habibi Mahmoud Gardeshi Mahdi R. Alaghband

Radio Frequency Identification (RFID) is appearing as a favorite technology for automated identification, which can be widely applied to many applications such as e-passport, supply chain management and ticketing. However, researchers have found many security and privacy problems along RFID technology. In recent years, many researchers are interested in RFID authentication protocols and their s...

2007
JaeCheol Ha Sang-Jae Moon Juan Manuel González Nieto Colin Boyd

This paper proposes a low-cost and strong-security RFID protocol to reduce the computational load on both the back-end database and the tags in an RFID system. When desynchronization occurs as a result of a communication failure or malicious attack, the proposed protocol can recover synchronization between the database and the tag in the following session. Furthermore, the proposed protocol als...

Journal: :Interface Focus 2010

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید