نتایج جستجو برای: protocol rfid

تعداد نتایج: 257823  

2014
Charles Z. Liew Raymond P. Shaw Ting-Ting Zhang

In this paper, we share our recent work related to Radio Frequency Identification (RFID) sensor network with readers. The work mainly focus on the protocol for network system to perform the task of autonomous decentralized data distribution with consideration of economic and low-power RFID-sensor module scheme. We analyzed data pitfall in distributed RFID-sensor network, revealing the reason li...

Journal: :I. J. RF Technol.: Res. and Appl. 2016
V. Caredda Pier Francesco Orrù Giovanni Romagnoli Andrea Volpi F. Zedda

OBJECTIVE: The objective of the paper is to design a testing protocol to measure performances of RFID devices applied to blood supply chain, and to implement an experimental campaign in order to collect performance data. The protocol matches operational conditions in blood supply chain and is particularly tailored to some critical processes, which can benefit from RFID adoption. The paper thus ...

2014
Mohsen Pourpouneh

With the increased radio frequency identification (RFID) applications different authentication schemes have been proposed in order to meet the required properties. In this paper we analyze the security of a server-less RFID authentication protocol which is proposed by Deng et al. in 2014. Deng et al. proposed an improvement over Hoque et al. protocol to overcome its vulnerability against data d...

2006
Batbold Toiruul KyungOh Lee

The biggest challenge for current RFID technology is to provide the necessary benefits while avoiding any threats to the privacy of its users. Although many solutions to this problem have been proposed, almost as soon as they have been introduced, methods have been found to circumvent system security and make the user vulnerable. We are proposing an advanced mutualauthentication protocol betwee...

Journal: :JIPS 2011
Daewan Han

Since security and privacy problems in RFID systems have attracted much attention, numerous RFID authentication protocols have been suggested. One of the various design approaches is to use light-weight logics such as bitwise Boolean operations and addition modulo 2 between m-bits words. Because these operations can be implemented in a small chip area, that is the major requirement in RFID prot...

Journal: :IACR Cryptology ePrint Archive 2017
Seyed Farhad Aghili Hamid Mala

Over the last few years, more people perform their social activities on mobile devices, such as mobile payment or mobile wallet. Mobile commerce (m-commerce) refers to manipulating electronic commerce (e-commerce) by using mobile devices and wireless networks. Radio frequency identification (RFID) is a technology which can be employed to complete payment functions on m-commerce. As an RFID subs...

Journal: :I. J. Network Security 2009
Tianjie Cao Peng Shen

Radio frequency identification (RFID) technologies have many advantages in applications such as object tracking and monitoring, ticketing, supply-chain management, contactless payment systems. However, the RFID system may bring about various security and privacy problems. In this paper we present our security analysis of the LAK protocol and the CWH protocol. First, we show that the LAK protoco...

2015
Hesham A. El Zouka Mustafa M. Hosni

The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks which limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceabil...

2014
Ji Hyoung Ahn Jaeyoung Lee Jongho Park Tae-Jin Lee

In radio frequency identification (RFID) systems, if tags transmit their IDs simultaneously, a reader cannot correctly identify the IDs due to collision and the performance of RFID systems degrades by the collision. So, anti-collision protocols to reduce the number of collisions are required. The binary tree anti-collision protocol branches randomly in a tree to reduce collisions in the next id...

Journal: :J. Network and Computer Applications 2014
Lijun Gao Maode Ma Yantai Shu Yuhua Wei

Radio Frequency Identification (RFID) technology will become one of the most popular technologies to identify objects in the near future. However, the major barrier that the RFID system is facing presently is the security and privacy issue. Recently, an ultralightweight RFID authentication protocol with permutation has been proposed to provide security and prevent all possible attacks. However,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید