نتایج جستجو برای: protocol rfid

تعداد نتایج: 257823  

2014
Ramesh Babu

Passive RFID systems used for list organization and benefit tracking normally use contention-based MAC protocols, such as the normal C1G2 protocol. Although the C1G2 protocol has the benefit that it is easy to apply, it suffers from wrongness and relatively low throughput when the number of tags in the network increases. It proposes a token-based MAC protocol called Token-MAC for passive RFID s...

Journal: :Int. J. Communication Systems 2010
Kideok Cho Sangheon Pack Ted Taekyoung Kwon Yanghee Choi

Radio frequency identification (RFID) is an enabling technology for a variety of applications in nextgeneration network (NGN). Although several RFID management frameworks are proposed in the literature, they have limitations in terms of service extension. In this paper, we propose an extensible RFID management framework called SIP-based RFID management system (SRMS), which can support various R...

2014
Seyed Mohammad Alavi Karim Baghery Behzad Abdolmaleki

Recently, due to widespread use of Radio Frequency IDentification (RFID) systems in personal applications, security and privacy of these systems have got more attention. In order to provide security and privacy of RFID users, different authentication protocols have been proposed. In 2014, Mohammadi et al. proposed an improved authentication protocol for RFID systems. They claimed that their pro...

Journal: :JCM 2008
Tianjie Cao Peng Shen Elisa Bertino

Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. ’s LCSS RFID authentication protocol, Song and Mitchell’s protocol are identified. The former attack can break the synchronization between the RFID reader and the tag in a single protocol run so that they can not authenticate each other in any following protocol run. The latter can impersonate a ...

Journal: :JNW 2014
QingLing Cai YiJu Zhan Jian Yang

Numerous RFID authentication protocols proposed often have some security vulnerabilities, since they lack systematic theory support. We had proposed a series of rules called R-RAPSE (RFID Authentication Protocol Security Enhanced Rules) for RFID authentication protocol design and verification. By three examples, this paper justifies why the protocols do not offer sufficient security and privacy...

Journal: :IEICE Transactions 2010
Dang Nguyen Duc Kwangjo Kim

A RFID group scanning protocol enables a RFID reader to produce a proof of co-existence of multiple RFID tags. This type of protocol is also referred to as yoking-proof, grouping-proof and co-existence proof. In this letter, we show that all of the previous group scanning protocols are vulnerable to relay attack. key words: yoking-proof, grouping-proof, co-existence-proof, relay attack

2007
Dang Nguyen Duc Hyunrok Lee Kwangjo Kim Dang Nguyen

In this whitepaper, we present a synchronization-based communication protocol for EPCglobal Class-1 Gen-2 RFID devices. The Class-1 Gen-2 RFID tag supports only simple cryptographic primitives like Pseudo-random Number Generator (PRNG) and Cyclic Redundancy Code (CRC). Our protocol is secure in a sense that it prevents the cloned tags and malicious readers from impersonating and abusing legitim...

2006
Dang Nguyen Duc Hyunrok Lee Kwangjo Kim

In this whitepaper, we present a synchronization-based communication protocol for EPCGlobal Class-1 Gen-2 RFID devices. The Class-1 Gen-2 RFID tag supports only simple cryptographic primitives like Pseudo-random Number Generator (PRNG) and Cyclic Redundancy Code (CRC). Our protocol is secure in a sense that it prevents the cloned tags and malicious readers from impersonating and abusing legitim...

2013
Nan Li Yi Mu Willy Susilo Fuchun Guo Vijay Varadharajan

Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, we launch an attack on the recent zero-knowledge based identification protocol for RFID, which was claimed to capture wide-strong privacy, and show that this protocol is flawed. Su...

2015
Xie Yumin

Identification is a very important usage case of RFID. This kind of usage can be subverted by a specific type of attack, such as counterfeiting, sniffing, tracking and so on. From a certain point of view, to protect an RFID tag’s privacy or security is to keep its ID hidden from an illegal reader. In this paper, we proposed an ID-based privacy protect protocol for an RFID-based smart card. This...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید