Privacy-enhanced RFID Tag Search System
نویسندگان
چکیده
Radio frequency identification (RFID) technology is used to identify RFID-tagged objects automatically. An RFID system generally consists of three components: an RFID tag, an RFID reader, and a backend system. An RFID tag is a small device for identification, which is attached to or embedded in an object. It has an unique identifier and may optionally hold additional product information for the object. An RFID reader is a device used to interrogate RFID tags. It can be fixed or portable. It passes communication messages between an RFID tag and a backend system. A backend system stores and manages the online data which are associates with RFID tags. Since the communication between an RFID tag and an RFID reader occurs without optical line of sight, RFID tags can be read much longer and much faster than other automatic identification and data capture (AIDC) technologies such as Bar-codes and smartcards. Thanks to these advantages, RFID technology has various applications.
منابع مشابه
Secure and Efficient Tag Searching in RFID Systems using Serverless Search Protocol
In the coming pervasive society, Radio Frequency Identification(RFID) Tags will be affixed within every product and object including human. This technology is anticipated to be a major technology which will be utilized by several pervasive services where these tags will be used to identify various objects. However, the use of RFID tags may create new threats to the security and privacy of indiv...
متن کاملAn Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection
RFID authentication has raised many concerns about the security risks and privacy issues due to its lightweight authentication properties. Many research achievements in RFID focus on strengthening the entire RFID system and solving the security problems. Recently, a hashbased RFID security protocol with the intension of updating the identifier of the tag in both the reader side and the tag side...
متن کاملEnhanced RFID Mutual Authentication Scheme based on Synchronized Secret Information
Radio Frequency IDentification (RFID) is an automatic identification system, relying on storing and remotely retrieving data about objects we want to manage using devices called “RFID tag”. Even though RFID system is widely useful for industrial and individual applications, RFID tag has a serious privacy problem, i.e., traceability. To protect users from tracing, we propose an RFID mutual authe...
متن کاملar X iv : 0 90 9 . 12 57 v 1 [ cs . C R ] 7 S ep 2 00 9 Practical Schemes For Privacy & Security Enhanced RFID
Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather costly key search time penalty at the reader. Moreover, they do not allow for dynamic, fine-grained access cont...
متن کاملRFID Mutual Authentication Scheme based on Synchronized
Radio Frequency IDentification (RFID) is an automatic identification system, relying on storing and remotely retrieving data about objects we want to manage using devices called “RFID tag”. Even though RFID system is widely useful for industrial and individual applications, RFID tag has a serious privacy problem, i.e., traceability. To protect users from tracing, we propose an RFID mutual authe...
متن کامل