Networked RFID Systems and Lightweight Cryptography
نویسندگان
چکیده
This book is a comprehensive guide to networks of Radio Frequency Identification (RFID) based Electronic Product Codes (EPCs) in supply chains, and its topics range from standardised hardware designs through known vulnerabilities, security and privacy models, and to concrete proposals for RFID authentication in various scenarios: machine readable documents, oneand two-way authentication in supply chains, and the pharmaceutical industry. Though a better insight into several discussion points requires additional reading, the book nevertheless provides both a good overview of the general challenges and opportunities in the area of supply chain RFID, and a comprehensive guide to further literature.
منابع مشابه
A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography
The security and privacy of the tag carrier has become the bottle neck of Radio Frequency Identification (RFID) system development further. In this paper, we propose a robust authentication protocol based on Elliptic Curve Cryptography (ECC), which meets the requirement of resource-limited RFID systems. Our protocol achieves mutual authentication and possesses lightweight feature by reducing th...
متن کاملLightweight Authentication Protocol for Low-Cost RFID Tags
Providing security in low-cost RFID tags is a challenging task because tags are highly resource constrained and cannot support strong cryptography. Special lightweight algorithms and protocols need to be designed that take into account the limitations of the tags. In this paper, we propose a set of extremely lightweight tag authentication protocols. We also provide an analysis of the proposed p...
متن کاملA Strong RFID Mutual Authentication Protocol Based on a Lightweight Public-key Cryptosystem
RFID is a key technology that can be used to create the ubiquitous society. However, this technology may suffer from some serious threats such as privacy disclosure. In order to solve these secure problems we propose a strong mutual authentication protocol based on a lightweight public-key cryptosystem: NTRU. The protocol assures the confidentiality of the RFID system by encrypting the messages...
متن کاملSurvey on Lightweight Primitives and Protocols for RFID in Wireless Sensor Networks
The use of radio frequency identification (RFID) technologies is becoming widespread in all kind of wireless network-based applications. As expected, applications based on sensor networks, ad-hoc or mobile ad hoc networks (MANETs) can be highly benefited from the adoption of RFID solutions. There is a strong need to employ lightweight cryptographic primitives for many security applications beca...
متن کاملNeeva: A Lightweight Hash Function
RFID technology is one of the major applications of lightweight cryptography where security and cost both are equally essential or we may say that cost friendly cryptographic tools have given more weightage. In this paper, we propose a lightweight hash, Neeva-hash satisfying the very basic idea of lightweight cryptography. Neeva-hash is based on sponge mode of iteration with software friendly p...
متن کامل