نتایج جستجو برای: rfid authentication protocol

تعداد نتایج: 283411  

2007
Hung-Yu Chien Chen-Wei Huang

As low-cost RFIDs with limited resources will dominate most of the RFID market, it is imperative to design lightweight RFID authentication protocols for these low-cost RFIDs. However, most of existing RFID authentication protocols either suffer from some security weaknesses or require costly operations that are not available on low-cost tags. In this paper, we analyze the security vulnerabiliti...

Journal: :I. J. Network Security 2018
Shin-Yan Chiou Wen-Tsai Ko Erl-Huei Lu

Mobile RFID applications combine RFID technologies and mobile device to create a new convenient application area. However, most of the applications suffer from the security issues due to insecure communication channels among tags, readers and servers. In 2012, Zhou et al. proposed an ECC-based mutual authentication protocol to promote mobile RFID applications security. However, we found their p...

2006
Hyun Seok Kim Il-Gon Kim Keun-Hee Han Jin-Young Choi

Radio frequency identification (RFID) is expected to become an important and ubiquitous infrastructure technology. As RFID tags are affixed to all items, they may be used to support various useful services. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy and authentication among communication participants. Security mechanisms for RFID...

Journal: :IACR Cryptology ePrint Archive 2015
Behzad Abdolmaleki Hamidreza Bakhshi Karim Baghery Mohammad Reza Aref

In the past few years, the design of RFID authentication protocols in accordance with the EPC Class-1 Generation-2 (EPC C1 G2) standards, has been one of the most important challenges in the information security domain. Although RFID systems provide user-friendly services for end-users, they can make security and privacy concerns for them. In this paper we analyze the security of an RFID mutual...

2011
Lejla Batina Stefaan Seys Dave Singelée Ingrid Verbauwhede

RFID (Radio Frequency Identification) technology enables readers to scan remote RFID tags, and label the objects and people to which they are attached. Current cryptographic authentication protocols deployed in heterogeneous environments are often not compatible, or reveal too much information to the RFID readers. To tackle this problem, we introduce the concept of RFID groups and propose a hie...

2007
Seongan Lim Ikkwon Yie

To assure the privacy of RFID Tags, symmetric challenge-response identification protocols have been considered. Due to the low cost requirements for tags, it has been assumed that the tampering of RFID tags is possible. In this paper, we estimate the privacy leakage of challenge-response RFID authentication protocols based on symmetric key using discrete probability under the assumption that ta...

2014
Seyed Mohammad Alavi Behzad Abdolmaleki Karim Baghery

In the last decade, Radio Frequency Identification (RFID) systems are employed in many authentications and identifications applications. In RFID systems, in order to provide secure authentication between RFID users, different authentication protocols proposed. In 2011, Cho et al. proposed a hash-based mutual RFID authentication protocol (HRAP). They claimed that HRAP protocol provides secure co...

2009
Songyi Kim

RFID (Radio Frequency IDentification) system has been widely used in our life, such as transport systems, passports, automotive, animal tracking, human implants, library, and so on. However, the RFID authentication protocols between RF (Radio Frequency) tags and the RF readers have been bring about various privacy problems that anonymity of the tags, tracking, eavesdropping, and so on. Many res...

Journal: :Malaysian Journal of Computer Science 2023

In addition to its benefits, the popular Internet of Things (IoT) technology has also opened way novel security and privacy issues. The basis IoT starts with trust in hardware supply chain. Counterfeiting, cloning, tampering hardware, theft, lost issues chain have be addressed, order ensure reliable industry growth. four previous works, radio-frequency identification (RFID)-enabled solutions be...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید