نتایج جستجو برای: rfid authentication protocols

تعداد نتایج: 139141  

2013
Il-Soo Jeon Eun-Jun Yoon

Since Low-cost RFID tags have very limited hardware resources, it is difficult to implement an authentication protocol which uses heavy operations such as modern ciphers or hash functions. It has been presented some ultra-lightweight RFID authentication protocols for low-cost RFID tags by using very light operations. Recently, Jeon and Yoon proposed a new ultra-lightweight RFID authentication p...

2012
Ritu Dahiya Ravinder Dahiya

RFID (Radio Frequency Identification) is recently becoming popular due to its convenience and economical efficiency. Furthermore, RFID nowadays comes into the spotlight as a technology to substitute the barcode. On the other hand, RFID is jeopardized from various attacks and problems as an obstacle of widespread RFID deployment: replay, spoofing, traceability, de-synchronization, un-scalability...

Journal: :IACR Cryptology ePrint Archive 2006
Gene Tsudik

Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication abilities of a typical RFID tag. This paper describes a step-by-step construction of a family of simple protocols for inexpensive untraceable identification and authentication of RFID tags. This work is aimed primarily ...

Journal: :International Journal of Electronics and Telecommunications 2023

RFID systems are one of the essential technologies and used many diverse applications. The security privacy primary concern in which overcome by using suitable authentication protocols. In this manuscript, cost-effective RFID-Mutual Authentication (MA) a lightweight Extended Tiny encryption algorithm (XTEA) is designed to issues on Hardware Platform. proposed design provides two levels security...

2010
Yong Ki Lee Lejla Batina Dave Singelée Ingrid Verbauwhede

The emergence of pervasive computing devices such as RFID tags raises numerous privacy issues. Cryptographic techniques are commonly used to enable tag-to-server authentication while protecting privacy. Unfortunately, these algorithms and their corresponding implementations are difficult to adapt to the extreme conditions implied by the use of RFID. The extremely limited budget for energy and a...

Journal: :IACR Cryptology ePrint Archive 2012
Shao-hui Wang Zhijie Han Sujuan Liu Dan-wei Chen

One of the key problems in Radio Frequency Identification(RFID) is security and privacy. Many RFID authentication protocols have been proposed to preserve security and privacy of the system. Nevertheless, most of these protocols are analyzed and it is shown that they can not provide security against some RFID attacks. RAPP is a new ultralightweight authentication protocol with permutation. In R...

Journal: :IACR Cryptology ePrint Archive 2013
Shao-hui Wang Fu Xiao Dan-wei Chen Ruchuan Wang

One of the key problems in Radio Frequency Identification (RFID) is security and privacy. Many RFID authentication protocols have been proposed to preserve security and privacy of the system. Nevertheless, most of these protocols are analyzed and it is shown that they can not provide security against some RFID attacks. In WISTP 2013, a new lightweight authentication protocol using AES S-box and...

Journal: :IACR Cryptology ePrint Archive 2016
Mohammad Mardani Shahrbabak Shahab Abdolmaleky

RFID technology is a system which uses radio frequency to transmit data. Data transmission between Tags and Readers is wireless which can be easily eavesdropped by adversary. Due to security and privacy reasons, various authentication protocols proposed. In this paper, we cryptanalyze two different RFID authentication protocols and it is shown that either of them have some weaknesses. In 2014, ...

Journal: :IJMC 2012
Chia-Hui Wei Min-Shiang Hwang Augustin Yeh-Hao Chin

In the past researches, most of the authentication protocols were designed in an effort to solve the RFID security and privacy problem regarding the encrypted communication between the database and readers, and readers and tags. Based on the proposal of mobile agent device for RFID privacy protection (MARP), some security problems have been exposed. Later on, protecting the privacy with a mobil...

Journal: :IACR Cryptology ePrint Archive 2017
Seyed Farhad Aghili Hamid Mala

Design of ultra-lightweight authentication protocols for RFID systems conformed with the EPC Class-1 Generation-2 standard is still a challenging issue in RFID security. Recently, Maurya et al. have proposed a CRC based authentication protocol and claimed that their protocol can resist against all known attacks in RFID systems. However, in this paper we show that their protocol is vulnerable to...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید