نتایج جستجو برای: rfid tags

تعداد نتایج: 24998  

2009
Antti Ruhanen

This report documents the results of task 4.2.2 “Secure Semi-Passive RFID Tags”. After a brief motivation for development of semi-passive tags in WP4 as prototype platform, the report shortly describes the three different platforms. A more detailed report about the development of the tags is available in D4.2.1. The following analysis section presents the results of the tests that were performe...

2012
Bo Zhang Dongkai Yang Qishan Zhang

To raise the RFID UHF reader’s performance, a test environment must be established. Using a lot of real tags to establish a test bed may induce some demerits, such as high resources costs and so on. So some institutions which engaged in RFID research developed some simulation systems for algorithm designing to provide reference information and technical support. 1. TI Gen2 standard tag simulato...

Journal: :IACR Cryptology ePrint Archive 2006
Ilan Kirschenbaum Avishai Wool

Radio-Frequency Identifier (RFID) technology, using the ISO-14443 standard, is becoming increasingly popular, with applications like credit-cards, national-ID cards, E-passports, and physical access control. The security of such applications is clearly critical. A key feature of RFID-based systems is their very short range: Typical systems are designed to operate at a range of 5-10cm. Despite t...

Journal: :Journal of the Institute of Industrial Applications Engineers 2021

Flawed authentication protocols led to the need for a secured protocol radio frequency identification (RFID) techniques. In this paper, an named Modified ultralightweight mutual (MUMAP) has been proposed and cryptanalysed by Juel-Weis challenge. The aimed reduce memory requirements in process low-cost RFID tags with limited resources. Lightweight operations like XOR Left Rotation, are used circ...

Journal: :Journal of Computer Security 2011
Rishab Nithyanand Gene Tsudik Ersin Uzun

Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and payment instruments. In this context, public key certificates form the cornerstone of the overall system security. In this paper, we argue that one of the prominent challenges is how to handle revocation and expiration checkin...

Journal: :Advanced Engineering Informatics 2016
Ali Motamedi Mohammad Mostafa Soltani Shayan Setayeshgar Amin Hammad

Building Information Modeling (BIM) is emerging as a method of creating, sharing, exchanging and managing the building information throughout the lifecycle between all stakeholders. Radio Frequency Identification (RFID), on the other hand, has emerged as an automatic data collection and information storage technology, and has been used in different applications in the AEC/FM (Architecture, Engi...

2014
Mohd Faizal Mubarak Jamalul-lail Ab Manan

RFID technology is becoming more pervasive and it is moving towards integration with other systems. The wireless communication between RFID reader and tags provides lots of benefits to users in business and as well as non-business area. However, unprotected data in the wireless communication channel of the RFID system introduced security risks. Even the integrity of the RFID reader could be com...

2014
Minghui Wang Junhua Pan

Tag cost and privacy of RFID technology are two main factors that determine whether it will be applied to Internet of Things on a large scale. Recently, RFID industry and research community have focused on RFID authentication protocols with provable privacy and low tag cost. In this paper, we propose an RFID security protocol that achieves all security requirements based on a hash function and ...

Journal: :Computer Networks 2011
Rolando Trujillo-Rasua Agusti Solanas

There is a need for efficient communication protocols that allow the private and scalable deployment of RFID systems with a large number of tags. In this paper, we leverage the idea of using distributed, collaborative readers to identify RFID tags and propose a new probabilistic communication protocol for those readers to privately identify RFID tags more efficiently in terms of computational c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید