نتایج جستجو برای: rfid authentication protocol
تعداد نتایج: 283411 فیلتر نتایج به سال:
RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In 2009, Chien and Laih proposed an RFID authentication protocol based on error correction codes (ECC) to secure RFID systems with untraceability, which is one of the most critical privacy issues on RFID. In thi...
One of the key problems in Radio Frequency Identification(RFID) is security and privacy. Many RFID authentication protocols have been proposed to preserve security and privacy of the system. Nevertheless, most of these protocols are analyzed and it is shown that they can not provide security against some RFID attacks. RAPP is a new ultralightweight authentication protocol with permutation. In R...
Recently, lightweight RFID authentication protocol has been investigated due to the awareness of practical requirements on individual privacy, system security and resource limitation of low cost tags. Research community demonstrates major advancements in this interesting research area of designing a robust access control and information retrieval mechanism for RFID system. In 2008, two well-stu...
A mobile RFID system is a radio frequency identification technology that allows users to read the information on its tags. When this free reading function is combined with a mobile RFID system featuring radio frequency identification, it may violate an individuals privacy. This is because others may obtain personal information by reading the tags. In addition, user tracking can be a problem, be...
Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purposes. Distance bounding protocols are particularly designed as a countermeasure against these attacks. These protocols aim to ensure that the tags are in a distant area by measuring the round-trip delays during a rapid challenge-res...
In RFID security(Gildas), few mechanisms focus on data protection of the tags, message interception over the air channel, and eavesdropping within the interrogation zone of the RFID reader(Sarma et al.a)(Weis et al.). Among these issues, we will discuss two aspects on the risks posed to the passive party by RFID , which have so far been dominated by the topics of data protection associated with...
The availability of safety has always been a challenge in all fields computing and networking, the development reliable security measures for low operating power systems continuous task researchers. This paper focuses on Radio Frequency Identification (RFID) systems, whose market is tremendously growing due to increasing need efficient supply chain healthcare management. Two protocols are propo...
Radio Frequency Identification (RFID) is one a promising technology for fast and automatic identification of different objects. This system operates without human intervention; moreover, it processes many simultaneous requests in a very short time span. While RFID applications are increasing, at the same time so are activities regarding their security. Providing the highest level of security an...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید