Comparison of Transmission Control Protocols Based on EPC C1G2 Standard
نویسندگان
چکیده
a transmission control scheme plays an important role in determining a protocol’s performance. Protocol performance can be measured based on a variety of factors. In this paper we compared four protocols that are compatible with EPC C1G2 standard using four units of performance, namely System Efficiency, Time System Efficiency, Total Number of Slots and Total Time.The results show not only the strengths and weaknesses of the protocols measured, but also highlight the importance of evaluating all relevant performance factors when comparing protocols as opposed to weighing performance using one or two units.
منابع مشابه
Traceability Improvements of a New RFID Protocol Based On EPC C1G2
Radio Frequency Identification (RFID) applications have spread all over the world and, in order to provide their security and privacy, researchers proposed different kind of protocols. In this paper, we analyzes the privacy of a new protocol, proposed by YuJehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi-Phan privacy model, w...
متن کاملTraceability improvements of a new RFID protocol based on EPC C1 G2
Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...
متن کاملTriggering Hardware Trojans in EPC C1G2 RFID Tags
This paper addresses the Hardware Trojan issues in passive EPC C1G2 RFID Tags. We propose in this paper to study the insertion of malicious circuit in EPC GEN2 RFID tags. The description and the implementation of several different Hardware Trojans are first discussed. Then they are all evaluated in an EPC GEN2 environment using a dedicated FPGA based tag emulator. The evaluation focuses on crit...
متن کاملCryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
Article history: In 2006, the standard EPC Received 16 May 2007 Received in revised form 7 March 2008 Accepted 4 May 2008 Available online 18 May 2008
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013