نتایج جستجو برای: rfid authentication protocol

تعداد نتایج: 283411  

2014
Jian Shen Haowen Tan Yuhui Zheng Sai Ji Jin Wang

RFID authentication has raised many concerns about the security risks and privacy issues due to its lightweight authentication properties. Many research achievements in RFID focus on strengthening the entire RFID system and solving the security problems. Recently, a hashbased RFID security protocol with the intension of updating the identifier of the tag in both the reader side and the tag side...

Journal: :TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES 2015

2012
Jitendra B. Gurubani Harsh Thakkar Dhiren R. Patel

Radio Frequency Identification (RFID) systems are increasingly being deployed in a variety of applications. In this paper, we propose a light weight mutual authentication protocol which is an improvement over extended LMAP+ protocol. In mutual authentication, the tag and the reader of the RFID systems will authenticate each other before transmitting unique ID of tag. The proposed protocol provi...

2011
M. Sandhya T. R. Rangaswamy

The integration of RFID technology and mobile smart device stimulates the daily increasing popularity of mobile RFID-based applications, which makes its way to become a new hot zone for research and development. Current RFID authentication schemes are not viable to use in mobile RFID environment. The authentication schemes result in computing load to the low cost tag and provide insufficient pr...

2013
Roel Peeters Jens Hermans Junfeng Fan

One of the concerns that comes with the use of RFID tags is that these respond to any query. This can be overcome by having mutual authentication between reader and tag. However, the ordering between the two authentication steps is crucial. In this paper, we formalise mutual RFID authentication: capturing the necessary coupling between tag authentication and reader authentication as well as the...

2008
Sheikh I. Ahamed Farzana Rahman Endadul Hoque Fahim Kawsar Tatsuo Nakajima

In the coming pervasive society, Radio Frequency Identification(RFID) Tags will be affixed within every product and object including human. This technology is anticipated to be a major technology which will be utilized by several pervasive services where these tags will be used to identify various objects. However, the use of RFID tags may create new threats to the security and privacy of indiv...

2014
Hyun-Seok Kim

Recently, Radio frequency identification (RFID) has been an important and ubiquitous infrastructure technology for smart work system. As RFID tags are affixed to all items, they may be used to support various useful services. Security mechanisms for RFID systems, such as authentication and encryption, are therefore of utmost importance. However, there are many risks involved, for example user p...

Journal: :IJMC 2012
Chia-Hui Wei Min-Shiang Hwang Augustin Yeh-Hao Chin

In the past researches, most of the authentication protocols were designed in an effort to solve the RFID security and privacy problem regarding the encrypted communication between the database and readers, and readers and tags. Based on the proposal of mobile agent device for RFID privacy protection (MARP), some security problems have been exposed. Later on, protecting the privacy with a mobil...

Journal: :JCM 2015
Jingxian Zhou

—Many RFID authentication protocols have been developed in recent years. However, most require the reader to search all tags in the system to identify a single tag. This problem makes the protocols impractical in large-scale RFID deployments. To address this problem, we propose a privacypreserving mutual authentication protocol for RFID systems with constant-time identification, based on Quadr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید