نتایج جستجو برای: protocol rfid
تعداد نتایج: 257823 فیلتر نتایج به سال:
RFID systems allow fast and automatic identification of RFID tags through a wireless channel. Information on product items like name, model, purpose, expiration date, etc., can be easily stored and retrieved from RFID tags attached to items. That is why, in the near future, RFID tags can be an active part of our everyday life when interacting with items around us. Frequently, such items may cha...
Ownership transfer and grouping proof protocols are the two most important requirements for RFID tag in various applications such as pharmaceutical distribution and manufacturing. In 2010, Zuo integrated these two requirements and introduced a protocol for RFID tag group ownership transfer (GOT), i.e., transferring the ownership of a group of tags in one session. However, this paper shows that ...
RFID (radio frequency identification) is a key technology supporting emerging solutions for the automation of the identification service and the mass product management. A key issue is to reduce the average time taken to identifying tags, which is called average identification time. Focusing on the issue, the paper proposes an efficient multicast protocol which is applied to the anti-collision ...
Radio Frequency Identification (RFID) tags have a variety of applications in e-banking. For effective utilization of the technology, this should be reinforced toward security holes and attacks. One of the common attacks on RFID systems is RFID tags cloning. In this paper we review cloning attacks in ebanking. We propose solutions based on physical unclonable functions (PUF) and provide a suitab...
RFID system is one of the fastest growing technologies among the automation applications needed in Organizations, Institution, and Supply Chain Management etc. Along with non-line of sight capability, RFID tag’s capability of durability, reusability, data encryption, increased storage and faster read rate etc. makes RFID systems much efficient, faster and robust than other existing systems such...
Radio Frequency Identification (RFID) is one a promising technology for fast and automatic identification of different objects. This system operates without human intervention; moreover, it processes many simultaneous requests in a very short time span. While RFID applications are increasing, at the same time so are activities regarding their security. Providing the highest level of security an...
A mobile RFID system is a radio frequency identification technology that allows users to read the information on its tags. When this free reading function is combined with a mobile RFID system featuring radio frequency identification, it may violate an individuals privacy. This is because others may obtain personal information by reading the tags. In addition, user tracking can be a problem, be...
The EPC Class-1 Generation-2 RFID standard provides little security, as has been shown in previous works such as [S. Karthikeyan, M. Nesterenko, RFID security without extensive cryptography, in: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2005, pp. 63–67; D.N. Duc, J. Park, H. Lee, K. Kim, Enhancing security of EPCglobal Gen-2 RFID tag against traceability and...
This paper proposes a low-cost and strong-security RFID protocol to reduce the computational load on both the back-end database and the tags in an RFID system. When desynchronization occurs as a result of a communication failure or malicious attack, the proposed protocol can recover synchronization between the database and the tag in the following session. Furthermore, the proposed protocol als...
RFID technology is a system which uses radio frequency to transmit data. Data transmission between Tags and Readers is wireless which can be easily eavesdropped by adversary. Due to security and privacy reasons, various authentication protocols proposed. In this paper, we cryptanalyze two different RFID authentication protocols and it is shown that either of them have some weaknesses. In 2014, ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید