نتایج جستجو برای: rfid authentication protocols

تعداد نتایج: 139141  

Journal: :CIT 2015
Ping Huang Haibing Mu Fei Zeng

Radio frequency identification (RFID) has spread into many fields. Its security and privacy has received more and more attention. Based on traditional authentication protocols, some other branches related to practical applications have been introduced including server-less authentication and searching protocols. The server-less searching protocol is extended from server-less authentication prot...

2013
Il-Soo Jeon Eun-Jun Yoon

The security of RFID systems is a very important issue in the applications of RFID systems. Developing of authentication protocols is a general solution to * Corresponding author: e-mail: [email protected] (Eun-Jun Yoon) 3434 Il-Soo Jeon and Eun-Jun Yoon resist security attacks. However, since low-cost RFID tags have very limited hardware resources, it is not easy to develop an authentication pr...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

2011
Kuo-Hui Yeh Nai-Wei Lo Yingjiu Li Yung-Chun Chen Tzong-Chen Wu

In order to protect privacy of RFID tag against malicious tag tracing activities, most RFID authentication protocols support forward/backward security properties by updating the same secret values held at both tag end and database end asynchronously during each authentication session. However, in real network environments an adversary may easily interrupt or interfere transmission of necessary ...

2012
Kaleb Lee Colin Boyd Juan Manuel González Nieto

The privacy of efficient tree-based RFID authentication protocols is heavily dependent on the branching factor on the top layer. Indefinitely increasing the branching factor, however, is not a viable option. This paper proposes the alternate-tree walking scheme as well as two protocols to circumvent this problem. The privacy of the resulting protocols is shown to be comparable to that of linear...

2008
Boyeon Song

In some applications, the bearer of a radio frequency identification (RFID) tag might change, with corresponding changes required in the RFID system infrastructure. We survey the security requirements for RFID tag ownership transfer, and propose novel authentication protocols for tag ownership and authorisation transfer. The proposed protocols satisfy most of the requirements that we present, a...

2014
Nan Li Yi Mu Willy Susilo Fuchun Guo Vijay Varadharajan

Radio Frequency Identification (RFID) has been widely adopted for object identification. An RFID system comprises three essential components, namely RFID tags, readers and a backend server. Conventionally, the system is considered to be controlled by a single party who maintains all the secret information. However, in some practical scenarios, RFID tags, readers and servers could be operated by...

Journal: :IACR Cryptology ePrint Archive 2016
Behzad Abdolmaleki Karim Baghery Shahram Khazaei Mohammad Reza Aref

Recently, Radio Frequency Identification (RFID) and Near Field Communication (NFC) systems are found in various user-friendly services that all of us deal with in our daily lives. As these systems are ubiquitously deployed in different authentication and identification applications, inferring information about our behavior will be possible by monitoring our use of them. In order to provide priv...

Journal: :Journal of the Institute of Industrial Applications Engineers 2021

Flawed authentication protocols led to the need for a secured protocol radio frequency identification (RFID) techniques. In this paper, an named Modified ultralightweight mutual (MUMAP) has been proposed and cryptanalysed by Juel-Weis challenge. The aimed reduce memory requirements in process low-cost RFID tags with limited resources. Lightweight operations like XOR Left Rotation, are used circ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید