Image Encryption Based Approach to Address Privacy and Security Issues in RFID Tags

نویسنده

  • Rajendra Nayak
چکیده

Due to the exponential growth in the World Wide Web and digital media, providing the security for the data has become one of the crucial issue. This situation has made researchers to look towards developing data encryption algorithms for addressing privacy and security issues in RFID. In this article, a simple and effective data encryption model for biometric data of RFID tags are addressed. The novel proposed model is composed of two stages like data encryption and data matching. Proposed data encryption approach is critically analyzed by conducting huge set of experiments on the publicly available face and palm corpuses. A data matching technique for the proposed encryption algorithm is also designed. The result of the experiments reveals that the proposed encryption algorithm outperforms for two types of the biometric data.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

RSPAE: RFID Search Protocol based on Authenticated Encryption

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

متن کامل

I. Radio-Frequency Identification: Security Risks and Challenges

Low-cost Radio Frequency Identification (RFID) tags affixed to consumer items as “smartlabels” may emerge as one of the most pervasive computing technologies in history. While RFID systems can yield great productivity gains, they may also expose new threats to the security and privacy of both individuals and organizations. This article gives a brief introduction to RFID technology and describes...

متن کامل

Browse searchable encryption schemes: Classification, methods and recent developments

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

متن کامل

AnSta: Anonymous Statistics using RFID tags

Current work in RFID security focuses mainly on authentication and privacy preserving identification. In this paper, we discuss the possibility of widening the scope of RFID security by introducing a new application scenario. The application we propose aims at collecting statistics on some attributes. The main requirement is to perform this operation without violating the privacy of the holders...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015