Privacy-enhanced RFID Tag Search System

نویسندگان

  • Ji Young Chun
  • Jung Yeon Hwang
  • Dong Hoon Lee
چکیده

Radio frequency identification (RFID) technology is used to identify RFID-tagged objects automatically. An RFID system generally consists of three components: an RFID tag, an RFID reader, and a backend system. An RFID tag is a small device for identification, which is attached to or embedded in an object. It has an unique identifier and may optionally hold additional product information for the object. An RFID reader is a device used to interrogate RFID tags. It can be fixed or portable. It passes communication messages between an RFID tag and a backend system. A backend system stores and manages the online data which are associates with RFID tags. Since the communication between an RFID tag and an RFID reader occurs without optical line of sight, RFID tags can be read much longer and much faster than other automatic identification and data capture (AIDC) technologies such as Bar-codes and smartcards. Thanks to these advantages, RFID technology has various applications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure and Efficient Tag Searching in RFID Systems using Serverless Search Protocol

In the coming pervasive society, Radio Frequency Identification(RFID) Tags will be affixed within every product and object including human. This technology is anticipated to be a major technology which will be utilized by several pervasive services where these tags will be used to identify various objects. However, the use of RFID tags may create new threats to the security and privacy of indiv...

متن کامل

An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection

RFID authentication has raised many concerns about the security risks and privacy issues due to its lightweight authentication properties. Many research achievements in RFID focus on strengthening the entire RFID system and solving the security problems. Recently, a hashbased RFID security protocol with the intension of updating the identifier of the tag in both the reader side and the tag side...

متن کامل

Enhanced RFID Mutual Authentication Scheme based on Synchronized Secret Information

Radio Frequency IDentification (RFID) is an automatic identification system, relying on storing and remotely retrieving data about objects we want to manage using devices called “RFID tag”. Even though RFID system is widely useful for industrial and individual applications, RFID tag has a serious privacy problem, i.e., traceability. To protect users from tracing, we propose an RFID mutual authe...

متن کامل

ar X iv : 0 90 9 . 12 57 v 1 [ cs . C R ] 7 S ep 2 00 9 Practical Schemes For Privacy & Security Enhanced RFID

Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather costly key search time penalty at the reader. Moreover, they do not allow for dynamic, fine-grained access cont...

متن کامل

RFID Mutual Authentication Scheme based on Synchronized

Radio Frequency IDentification (RFID) is an automatic identification system, relying on storing and remotely retrieving data about objects we want to manage using devices called “RFID tag”. Even though RFID system is widely useful for industrial and individual applications, RFID tag has a serious privacy problem, i.e., traceability. To protect users from tracing, we propose an RFID mutual authe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012