Tamper Detection for Low Cost Rfid Tags: Using Watermarking with Chaotic Mapping
نویسندگان
چکیده
Low cost RFID tags pose unique security and privacy challenges. There is an unresolved issue however of data tampering. Here we propose a watermarking based tamper detection solution for low cost RFID tags where the Object Class (OC) and the Serial number (SN) field of an RFID tag are used as the cover medium. Additionally, the use of a chaotic map (i.e. Skew Tent Map) in the watermark embedding algorithm makes this solution more secure. Unlike existing watermark based solutions, our proposed solution offers increased security and can detect tampering anywhere in the RFID tag (e.g. both in the EPC Manager and the Object Class field of an RFID tag), not just a portion such as the Object Class or the EPC manager. This proposed solution conforms to the EPC-Class1 Generation2 specification.
منابع مشابه
Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...
متن کاملNew Multipurpose Oriented Stereo Image Watermarking Algorithm for 3D Multimedia
Most of digital watermarking algorithms have been designed for only single purpose. In this paper, a new multipurpose oriented stereo image watermarking algorithm is proposed for three dimensional multimedia, which can be used for copyright protection, content authentication and tamper detection in three dimensional (3D) multimedia. Specifically, host stereo image is divided into non-overlappin...
متن کاملAn Improved Fragile Watermarking Method for Tamper Detection in RFID Tag
Tampering of RFID (Radio Frequency Identification) tag data results in misinterpretation of the object to which the tag is attached. Due to the advantages offered by RFID in the field of contactless auto identification, it is being used in the widespread range of applications. With growing adoption of RFID in industries, supply chain management, healthcare systems, security systems, government ...
متن کاملافزایش سرعت شناسایی در سیستمهای RFID
Radio frequency identification (RFID) is a new generation of automatic identification systems, based on wireless communication technology. In these systems all the tags using one communication channel to communicate with the reader. When two or more tags transmit their data to the reader simultaneously, their transmitted signals will collide. Resolving this collision has a direct impact on the ...
متن کاملTree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly
Authentication for low-cost Radio-Frequency IDentification (RFID) is a booming research topic. The challenge is to develop secure protocols using lightweight cryptography, yet ensuring privacy. A current trend is to design such protocols upon the Learning Parity from Noise (LPN) problem. The first who introduced this solution were Hopper and Blum in 2001. Since then, many protocols have been de...
متن کامل