نتایج جستجو برای: protocol rfid

تعداد نتایج: 257823  

2011
Albert Fernàndez-Mir Rolando Trujillo-Rasua Jordi Castellà-Roca Josep Domingo-Ferrer

RFID systems allow fast and automatic identification of RFID tags through a wireless channel. Information on product items like name, model, purpose, expiration date, etc., can be easily stored and retrieved from RFID tags attached to items. That is why, in the near future, RFID tags can be an active part of our everyday life when interacting with items around us. Frequently, such items may cha...

2011
Hoda Jannati Abolfazl Falahati

Ownership transfer and grouping proof protocols are the two most important requirements for RFID tag in various applications such as pharmaceutical distribution and manufacturing. In 2010, Zuo integrated these two requirements and introduced a protocol for RFID tag group ownership transfer (GOT), i.e., transferring the ownership of a group of tags in one session. However, this paper shows that ...

2008
Sung-Rok Yoon Sin-Chong Park

RFID (radio frequency identification) is a key technology supporting emerging solutions for the automation of the identification service and the mass product management. A key issue is to reduce the average time taken to identifying tags, which is called average identification time. Focusing on the issue, the paper proposes an efficient multicast protocol which is applied to the anti-collision ...

2011
Saeed Mehmandoust Reza Ebrahimi Atani

Radio Frequency Identification (RFID) tags have a variety of applications in e-banking. For effective utilization of the technology, this should be reinforced toward security holes and attacks. One of the common attacks on RFID systems is RFID tags cloning. In this paper we review cloning attacks in ebanking. We propose solutions based on physical unclonable functions (PUF) and provide a suitab...

2016
Priyanka Pandey Chandresh D. Parekh

RFID system is one of the fastest growing technologies among the automation applications needed in Organizations, Institution, and Supply Chain Management etc. Along with non-line of sight capability, RFID tag’s capability of durability, reusability, data encryption, increased storage and faster read rate etc. makes RFID systems much efficient, faster and robust than other existing systems such...

2015
Samad Rostampour Mojtaba Eslamnezhad Namin

Radio Frequency Identification (RFID) is one a promising technology for fast and automatic identification of different objects. This system operates without human intervention; moreover, it processes many simultaneous requests in a very short time span. While RFID applications are increasing, at the same time so are activities regarding their security. Providing the highest level of security an...

2012
Hyeong-Chan Lee TaeYang Eom Jeong Hyun Yi

A mobile RFID system is a radio frequency identification technology that allows users to read the information on its tags. When this free reading function is combined with a mobile RFID system featuring radio frequency identification, it may violate an individuals privacy. This is because others may obtain personal information by reading the tags. In addition, user tracking can be a problem, be...

Journal: :Computer Communications 2009
Pedro Peris-Lopez Tieyan Li Julio César Hernández Castro Juan E. Tapiador

The EPC Class-1 Generation-2 RFID standard provides little security, as has been shown in previous works such as [S. Karthikeyan, M. Nesterenko, RFID security without extensive cryptography, in: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2005, pp. 63–67; D.N. Duc, J. Park, H. Lee, K. Kim, Enhancing security of EPCglobal Gen-2 RFID tag against traceability and...

2007
JaeCheol Ha Sang-Jae Moon Juan Manuel González Nieto Colin Boyd

This paper proposes a low-cost and strong-security RFID protocol to reduce the computational load on both the back-end database and the tags in an RFID system. When desynchronization occurs as a result of a communication failure or malicious attack, the proposed protocol can recover synchronization between the database and the tag in the following session. Furthermore, the proposed protocol als...

Journal: :IACR Cryptology ePrint Archive 2016
Mohammad Mardani Shahrbabak Shahab Abdolmaleky

RFID technology is a system which uses radio frequency to transmit data. Data transmission between Tags and Readers is wireless which can be easily eavesdropped by adversary. Due to security and privacy reasons, various authentication protocols proposed. In this paper, we cryptanalyze two different RFID authentication protocols and it is shown that either of them have some weaknesses. In 2014, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید