Survey of Security Challenges in NFC and RFID for E-Health Applications

نویسندگان

  • Zornitza Genova Prodanoff
  • Edward L. Jones
  • Hongmei Chi
  • Sherif Elfayoumy
  • Cynthia Cummings
چکیده

1 Survey of Security Challenges in NFC and RFID for E-Health Applications Zornitza Prodanoff, University of North Florida, Jacksonville, FL, USA Edward L. Jones, Florida Agricultural and Mechanical University, Tallahassee, FL, USA Hongmei Chi, Florida Agricultural and Mechanical University, Tallahassee, FL, USA Sherif Elfayoumy, University of North Florida, Jacksonville, FL, USA Cynthia Cummings, University of North Florida, Jacksonville, FL, USA

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Challenges for User-Oriented RFID Applications

In this article, we examine the role played by RFID in enabling user-oriented networked applications. We explain why RFID is seen to be an important building block of the ‘Internet of Things’ and examine how RFID, assisted by the deployment of NFC devices, is increasingly facilitating useroriented, Internet-based application architectures. Finally, we look at the high-level security challenges ...

متن کامل

RSPAE: RFID Search Protocol based on Authenticated Encryption

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

متن کامل

Linking Data Access with the Physical Flow of Items

est as it quickly becomes a widely deployed pervasive technology. At the PERTEC (Pervasive RFID/Near Field Communication Technology and Applications) workshop on 19 March 2007 (part of PerCom 2007), about 30 researchers from Europe, Asia, and the US discussed issues in this field. Topics included management of data ownership in supply chains generated through RFID, integration of RFID and senso...

متن کامل

Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

متن کامل

Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJEHMC

دوره 7  شماره 

صفحات  -

تاریخ انتشار 2016