Tag Identification Scheme based on Multi-Reader for Reducing Tag Authentication Time

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-domain Rfid Access Control Using Asymmetric Key Based Tag-reader Mutual Authentication

Multi-domain RFID applications, such as asset tracking across domains, shift the paradigm in business model and enable next-generation business processes for aviation industry. The increasing number of RFID applications also merits the consolidation of RFID tags so they can serve multiple purposes. However, the adoption of such multi-domain RFID applications depends on their ability to enforce ...

متن کامل

Improved Tag Identification Method for reducing the Process Time of Tag Recognition

In recent years, radio frequency identification(RFID) technology has moved from obscurity into mainstream applications that speed up in identifying objects(e.g. manufactured goods, healthcare services, etc.) which affect our daily lives. However, there are several issues arises such as RFID tag collision problem which occurs due to the usage characteristics of radio frequency communication. The...

متن کامل

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme

Cloned fake RFID tags and malicious RFID readers pose a major threat to RFID-based supply chain management system. Fake tags can be attached to counterfeit products and medicines. Malicious readers can corrupt and snoop on genuine tags. These threats can be alleviated by incorporating a RFID tag-reader mutual authentication scheme. In this paper we propose a simple, cost-effective, light-weight...

متن کامل

HB and Related Lightweight Authentication Protocols for Secure RFID Tag/Reader Authentication∗

Lightweight authentication protocols are necessary in Radio-Frequency Identification (RFID) applications due to tag-level constraints. Over the past few years, several such protocols have been proposed and analyzed. We focus on the HB protocol and its variants. We show the vulnerability of some of these to attacks on tags, where the adversary pretends to be a valid reader, and propose a modifie...

متن کامل

Efficient Tag Path Authentication Protocol with Less Tag Memory

Logistical management has been advanced rapidly in these years, taking advantage of the broad connectivity of the Internet. As it becomes an important part of our lives, it also raises many challenging issues, e.g., the counterfeits of expensive goods pose a serious threat to supply chain management. As a result, path authentication becomes especially important in supply chain management, as it...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of the Korean Institute of Information and Communication Engineering

سال: 2012

ISSN: 2234-4772

DOI: 10.6109/jkiice.2012.16.1.013