نتایج جستجو برای: rfid authentication protocol

تعداد نتایج: 283411  

B. Abdolmaleki K. Baghery M. J. Emadi

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

2016
Wei-Liang Tai Ya-Fen Chang

Nowadays, plenty of radio frequency identification (RFID) systems have been proposed and used in the real world for convenience. An RFID system requires advanced properties of confidentiality, indistinguishability, forward security and mutual authentication to provide a higher security level. Safkhani et al. proposed a hash-based authentication protocol for RFID systems. Though their protocol p...

Journal: :JNW 2014
QingLing Cai YiJu Zhan Jian Yang

Numerous RFID authentication protocols proposed often have some security vulnerabilities, since they lack systematic theory support. We had proposed a series of rules called R-RAPSE (RFID Authentication Protocol Security Enhanced Rules) for RFID authentication protocol design and verification. By three examples, this paper justifies why the protocols do not offer sufficient security and privacy...

2013
Jian Shen Jin Wang Yuan Mei Ilyong Chung

Privacy is a major concern in RFID systems, especially with widespread deployment of wireless enabled interconnected personal devices. In this paper, we consider privacy issues in RFID systems where the authorized readers must be able to identify tags without an adversary being able to trace them, and provide a formal security model for privacy in RFID system. Under this model, we analyze the r...

2013
Jian Shen Wenying Zheng Jin Wang Zhihua Xia Zhangjie Fu

Privacy is a major concern in RFID systems, especially with widespread deployment of wireless enabled interconnected personal devices. In this paper, we consider privacy issues in RFID system where the authorized readers must be able to identify tags without an adversary being able to trace them, and provide a formal security model for privacy in RFID system. Under this model, we analyze the re...

2013
Il-Soo Jeon Eun-Jun Yoon

The security of RFID systems is a very important issue in the applications of RFID systems. Developing of authentication protocols is a general solution to * Corresponding author: e-mail: [email protected] (Eun-Jun Yoon) 3434 Il-Soo Jeon and Eun-Jun Yoon resist security attacks. However, since low-cost RFID tags have very limited hardware resources, it is not easy to develop an authentication pr...

Journal: :CoRR 2012
Noureddine Chikouche Cherif Foudil Mohamed Benmohammed

Radio Frequency Identification (RFID) and biometric technologies saw fast evolutions during the last years and which are used in several applications, such as access control. Among important characteristics in the RFID tags, we mention the limitation of resources (memory, energy, ...). Our work focuses on the design of a RFID authentication protocol which uses biometric data and which confirms ...

Journal: :I. J. Network Security 2016
Peng-yu Cui

Radio Frequency Identification (RFID) technology is an automated identification technology which is widely used to identify and track all kind of objects. However, it is a challenging task to design an authentication protocol because of the limited resource of Lightweight RFID tags. Recently, a lightweight RFID authentication protocol and an ownership transfer of RFID tags are presented by Kuls...

Journal: :CoRR 2010
Eslam Gamal Ahmed Eman Shaaban Mohamed Hashem

Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode technology. Although it offers many advantages over other identification systems, there are also associated security risks that are not easy to be addressed. When designing a real lightweight authentication protocol for lo...

Journal: :IJSN 2010
Shih-I Huang Shiuh-Pyng Shieh

This paper investigates authentication and secure data retrieval issues in Radio-Frequency IDentification (RFID)-aware wireless sensor networks. We propose a network architecture (ARIES) consisting of RFIDs and wireless sensor nodes, a mutual authentication protocol (AMULET), and a Secret Search Protocol (SSP). ARIES utilises RFID-aware sensor nodes to alleviate distance limitation problem in R...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید