نتایج جستجو برای: rfid authentication protocol
تعداد نتایج: 283411 فیلتر نتایج به سال:
Radio Frequency identification (RFID) will become an important technology in remotely object identification systems. However, the use of RFID tags may create new threats to the security and privacy of individuals holding RFID tags. These threats bring several problems which are information leakage of a tag, location trace of individuals and impersonation of a tag. Low-cost RFID systems have muc...
An optimal probabilistic solution for information confinement, privacy, and security in RFID systems
In this paper, we provide the following contributions to enhance the security of RFID based systems. First, we assume that among multiple servers storing the information related to the tags some of them can be compromised. For this new threat scenario, we devise a technique to make RFID identification server dependent, providing a different unique secret key shared by a tag and a server. The so...
a typical radio frequency identification system (rfid) includes one reader and a number of tags. the reader transmit to commands to the tags with interrogation radio signals, and tags receive the command and then respond with their identification. readers with interrogation signals can read tags’ responses. in rfid systems, when multiple tags respond to one reader simultaneously, tag collision ...
The research on the security of RFID (Radio Frequency Identification) has occupied the attention. Most of previous research results focus on the security and privacy between a RFID tag and a reader. However, the research on the security between a reader and a back-end server leaves much to be desired. And moreover The standard parties of RFID reader protocol, that are EPCglobal Reader Protocol ...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
As for security of RFID network, this paper has proposed a safe, effective and scalable RFID Authentication Protocol (CRFID) with cloud database as server. Firstly, the tree-structure management tag is used to achieve privacy protection, and the time complexity of RFID system in search of cloud database is reduced from O (N) to O (logN); then, the size of each subkey in keys route of the RFID t...
Radio Frequency Identification (RFID) is a technology that is very popular due to the simplicity in its technology and high adaptability in a variety of areas. The simplicity in the technology, however, comes with a caveat – RFID tags have severe resource restrictions, which make them vulnerable to a range of security attacks. Such vulnerability often results in the loss of privacy of the tag o...
Motivated by the design of the well-known Enigma machine, we present a novel ultra-lightweight encryption scheme, referred to as Hummingbird, and its applications to a privacy-preserving identification and mutual authentication protocol for RFID applications. Hummingbird can provide the designed security with a small block size and is therefore expected to meet the stringent response time and p...
Due to the stringent computational capabilities of low-cost RFID tags, several lightweight secure authentication protocols have been proposed for an RFID-based supply chain using bitwise operations. In this paper, we study vulnerabilities associated with operations by doing cryptanalysis a protocol tags. The like rotation and XOR show that is vulnerable tag, reader, node impersonation attacks. ...
In this paper we propose an efficient forward-private RFID mutual authentication protocol. The protocol is secure under standard assumptions. It builds over a recent work, extends it to achieve mutual authentication, and improves it by introducing a resynchronization mechanism between tag and reader, through which the server-side computation from O(Nω) is reduced to O(N + ω), where N is the tot...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید