Security analysis of RFID based devices in educative environments

نویسنده

  • Ahmed Saeed Alzahrani
چکیده

Educative environments such as public and private academic institutions are established with latest information communication technology (ICT) which includes RFID based devices. Innovation of academic infrastructure using latest ICT with maximum security is a future development in most of academic applications. Regarding the RFID based devices involved in educative environments; the level of security must be reconsidered in some applications. For instance different applications such as library, car park, laboratory etc. need different levels of security. However, there is a security problem, which is a practical challenge considered between the RFID reader and RFID tags. If more than one RFID card or tag is held by the user, more than one user is registered by the reader at the fixed time intervals. It means that monitoring of students’ attendance is recorded wrongly and students who are physically absent may be involved in the serious criminal activities. In order to avoid this problem, security analysis of RFID based devices in educative environments is a potential challenge. In this paper, a theoretical model of RFID based device with security protocol is considered to employ in educative environments. Possible security analysis expected to use in educative environments are mentioned as research methods because RFID devices in latest ICT need reasonable security which must be low-cost and maximum efficiency. From these model, students will gain not only learning capabilities but also they will achieve physical and mental fitness. Even though security is not a direct impact, its influences in this model create the peaceful time to increase the listening attitudes. Memory capacities also increased through this model, because it is directly influenced with listening, learning and punctuations. [Alzahrani A. Security analysis of RFID based devices in educative environments. Life Sci J 2014;11(1):133140]. (ISSN:1097-8135). http://www.lifesciencesite.com. 20

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

RSPAE: RFID Search Protocol based on Authenticated Encryption

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

متن کامل

Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

متن کامل

Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014