نتایج جستجو برای: rfid applications
تعداد نتایج: 616818 فیلتر نتایج به سال:
RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In 2009, Chien and Laih proposed an RFID authentication protocol based on error correction codes (ECC) to secure RFID systems with untraceability, which is one of the most critical privacy issues on RFID. In thi...
radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...
Radio Frequency Identification (RFID) has emerged as a key technology for automatic data collection and asset tracking and has been adopted in a variety of industries. However, the large volume and high velocity of data poses a major challenge for maintaining data processing efficiency and effectiveness. One viable solution for dealing with this challenge is Complex Event Processing (CEP), whic...
Automatic Identification Technology (AIT) has numerous potential applications in the maritime field. By putting AIT tracking devices, such as Radio Frequency Identification (RFID) tags, on materials and equipment, items can be accurately located, tracked, and recovered, while reducing the manpower and other costs associated with these tasks. This results in more efficient movement and utilizati...
Radio Frequency IDentification (RFID) is an automatic identification system, relying on storing and remotely retrieving data about objects we want to manage using devices called “RFID tag”. Even though RFID system is widely useful for industrial and individual applications, RFID tag has a serious privacy problem, i.e., traceability. To protect users from tracing, we propose an RFID mutual authe...
The project ART proposes to enhance passive RFID (Radio Frequency Identification) tags with cryptographically secure authentication. Starting with a short introduction into common RFID systems with passive tags, we present a motivation why secure authentication with standardized symmetric crypto algorithms for RFID tags is necessary for many applications. We demonstrate vulnerabilities of curre...
Advantages of Physically Uncloneable Functions (PUFs) have led to appearing a substantial number novel identification and authentication based systems such as Radio frequency (RFID), which is expected replace the conventional bar-code system due its advantages real-time recognition considerable objects. For example, RFID can be used identify an unmanned aerial vehicle (UAV) when it attached wit...
Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...
In the last decade, Radio Frequency Identification (RFID) has become popular in so many fields from military to industry applications. RFID tags have been embedded into many various products especially in logistics sector. A tag stores individual information of its attached object and an RFID reader communicates with the tag in radio frequencies to identify the object. This object to be monitor...
With mobile RFID technology, handheld portable devices like mobile phones and PDAs, also behave as RFID readers and RFID tags. As RFID readers, mobile phones provide an user-friendly approach to quickly and efficiently scan, access and view information about RFID tagged items. As RFID tags, mobile phones can quickly identify themselves in order to communicate with other tagged devices, which pr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید