Survey of Security Challenges in NFC and RFID for E-Health Applications
نویسندگان
چکیده
1 Survey of Security Challenges in NFC and RFID for E-Health Applications Zornitza Prodanoff, University of North Florida, Jacksonville, FL, USA Edward L. Jones, Florida Agricultural and Mechanical University, Tallahassee, FL, USA Hongmei Chi, Florida Agricultural and Mechanical University, Tallahassee, FL, USA Sherif Elfayoumy, University of North Florida, Jacksonville, FL, USA Cynthia Cummings, University of North Florida, Jacksonville, FL, USA
منابع مشابه
Security Challenges for User-Oriented RFID Applications
In this article, we examine the role played by RFID in enabling user-oriented networked applications. We explain why RFID is seen to be an important building block of the ‘Internet of Things’ and examine how RFID, assisted by the deployment of NFC devices, is increasingly facilitating useroriented, Internet-based application architectures. Finally, we look at the high-level security challenges ...
متن کاملRSPAE: RFID Search Protocol based on Authenticated Encryption
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...
متن کاملLinking Data Access with the Physical Flow of Items
est as it quickly becomes a widely deployed pervasive technology. At the PERTEC (Pervasive RFID/Near Field Communication Technology and Applications) workshop on 19 March 2007 (part of PerCom 2007), about 30 researchers from Europe, Asia, and the US discussed issues in this field. Topics included management of data ownership in supply chains generated through RFID, integration of RFID and senso...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJEHMC
دوره 7 شماره
صفحات -
تاریخ انتشار 2016