Tamper Detection for Low Cost Rfid Tags: Using Watermarking with Chaotic Mapping

نویسندگان

  • Kevin Curran
  • Tom Lunney
  • Ali N M Noman
چکیده

Low cost RFID tags pose unique security and privacy challenges. There is an unresolved issue however of data tampering. Here we propose a watermarking based tamper detection solution for low cost RFID tags where the Object Class (OC) and the Serial number (SN) field of an RFID tag are used as the cover medium. Additionally, the use of a chaotic map (i.e. Skew Tent Map) in the watermark embedding algorithm makes this solution more secure. Unlike existing watermark based solutions, our proposed solution offers increased security and can detect tampering anywhere in the RFID tag (e.g. both in the EPC Manager and the Object Class field of an RFID tag), not just a portion such as the Object Class or the EPC manager. This proposed solution conforms to the EPC-Class1 Generation2 specification.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking

Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...

متن کامل

New Multipurpose Oriented Stereo Image Watermarking Algorithm for 3D Multimedia

Most of digital watermarking algorithms have been designed for only single purpose. In this paper, a new multipurpose oriented stereo image watermarking algorithm is proposed for three dimensional multimedia, which can be used for copyright protection, content authentication and tamper detection in three dimensional (3D) multimedia. Specifically, host stereo image is divided into non-overlappin...

متن کامل

An Improved Fragile Watermarking Method for Tamper Detection in RFID Tag

Tampering of RFID (Radio Frequency Identification) tag data results in misinterpretation of the object to which the tag is attached. Due to the advantages offered by RFID in the field of contactless auto identification, it is being used in the widespread range of applications. With growing adoption of RFID in industries, supply chain management, healthcare systems, security systems, government ...

متن کامل

افزایش سرعت شناسایی در سیستم‌های RFID

Radio frequency identification (RFID) is a new generation of automatic identification systems, based on wireless communication technology. In these systems all the tags using one communication channel to communicate with the reader. When two or more tags transmit their data to the reader simultaneously, their transmitted signals will collide. Resolving this collision has a direct impact on the ...

متن کامل

Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly

Authentication for low-cost Radio-Frequency IDentification (RFID) is a booming research topic. The challenge is to develop secure protocols using lightweight cryptography, yet ensuring privacy. A current trend is to design such protocols upon the Learning Parity from Noise (LPN) problem. The first who introduced this solution were Hopper and Blum in 2001. Since then, many protocols have been de...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011