Tag Identification Scheme based on Multi-Reader for Reducing Tag Authentication Time
نویسندگان
چکیده
منابع مشابه
Multi-domain Rfid Access Control Using Asymmetric Key Based Tag-reader Mutual Authentication
Multi-domain RFID applications, such as asset tracking across domains, shift the paradigm in business model and enable next-generation business processes for aviation industry. The increasing number of RFID applications also merits the consolidation of RFID tags so they can serve multiple purposes. However, the adoption of such multi-domain RFID applications depends on their ability to enforce ...
متن کاملImproved Tag Identification Method for reducing the Process Time of Tag Recognition
In recent years, radio frequency identification(RFID) technology has moved from obscurity into mainstream applications that speed up in identifying objects(e.g. manufactured goods, healthcare services, etc.) which affect our daily lives. However, there are several issues arises such as RFID tag collision problem which occurs due to the usage characteristics of radio frequency communication. The...
متن کاملA Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme
Cloned fake RFID tags and malicious RFID readers pose a major threat to RFID-based supply chain management system. Fake tags can be attached to counterfeit products and medicines. Malicious readers can corrupt and snoop on genuine tags. These threats can be alleviated by incorporating a RFID tag-reader mutual authentication scheme. In this paper we propose a simple, cost-effective, light-weight...
متن کاملHB and Related Lightweight Authentication Protocols for Secure RFID Tag/Reader Authentication∗
Lightweight authentication protocols are necessary in Radio-Frequency Identification (RFID) applications due to tag-level constraints. Over the past few years, several such protocols have been proposed and analyzed. We focus on the HB protocol and its variants. We show the vulnerability of some of these to attacks on tags, where the adversary pretends to be a valid reader, and propose a modifie...
متن کاملEfficient Tag Path Authentication Protocol with Less Tag Memory
Logistical management has been advanced rapidly in these years, taking advantage of the broad connectivity of the Internet. As it becomes an important part of our lives, it also raises many challenging issues, e.g., the counterfeits of expensive goods pose a serious threat to supply chain management. As a result, path authentication becomes especially important in supply chain management, as it...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of the Korean Institute of Information and Communication Engineering
سال: 2012
ISSN: 2234-4772
DOI: 10.6109/jkiice.2012.16.1.013