نتایج جستجو برای: protocol rfid

تعداد نتایج: 257823  

2014
Seyed Mohammad Alavi Behzad Abdolmaleki Karim Baghery

In the last decade, Radio Frequency Identification (RFID) systems are employed in many authentications and identifications applications. In RFID systems, in order to provide secure authentication between RFID users, different authentication protocols proposed. In 2011, Cho et al. proposed a hash-based mutual RFID authentication protocol (HRAP). They claimed that HRAP protocol provides secure co...

Journal: :JCP 2013
Feng Xiao Yajian Zhou Jingxian Zhou Hongliang Zhu Xinxin Niu

Last few years, many security schemes are designed for RFID system since the release of the EPC Class 1 Generation 2 standard. In 2010, Yeh et al. proposed a new RFID authentication protocol conforming to EPC Class 1 Generation 2 standard. Yoon pointed that their protocol still had two serious security problems such as DATA integrity problem and forward secrecy problem. Then he proposed an impr...

Journal: :I. J. Network Security 2018
Rui Xie Bi-yuan Jian Dao-wei Liu

The ownership transfer problems occur during using the RFID tag. In view of the problems of the RFID tag ownership transfer protocol, such as security defects and high computational cost, an improved lightweight RFID tag ownership transfer protocol is proposed in this paper. The improved protocol does not depend on the trusted third party, so that the improved protocol has a wider application s...

2006
Hyunrok Lee Kwangjo Kim

The research on the security of RFID (Radio Frequency Identification) has occupied the attention. Most of previous research results focus on the security and privacy between a RFID tag and a reader. However, the research on the security between a reader and a back-end server leaves much to be desired. And moreover The standard parties of RFID reader protocol, that are EPCglobal Reader Protocol ...

2014
Jian Shen Haowen Tan Yuhui Zheng Sai Ji Jin Wang

RFID authentication has raised many concerns about the security risks and privacy issues due to its lightweight authentication properties. Many research achievements in RFID focus on strengthening the entire RFID system and solving the security problems. Recently, a hashbased RFID security protocol with the intension of updating the identifier of the tag in both the reader side and the tag side...

B. Abdolmaleki K. Baghery M. J. Emadi

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

2006
Youngjoon Seo Hyunrok Lee Kwangjo Kim

RFID (Radio Frequency Identification) is recently becoming popular, promising and widespread. In contrast, RFID tags can bring about traceability that causes user privacy and reduces scalability of RFID. Guaranteeing untraceability and scalability at the same time is so critical in order to deploy RFID widely since user privacy should be guaranteed. A large number of RFID protocols were designe...

2006
Feilong Tang Minglu Li Xinhua Yang Yi Wang Hongyu Huang Hongzi Zhu

Radio frequency identification (RFID) provides a quick, flexible, and reliable electronic means to detect, identify, track, and manage a variety of items. It has the potential to significantly alter how processes occur and how companies operate. Currently, the development of RFID and Grid technologies has opened the door to many new RFID applications, many of which require transaction support. ...

2014
Chien-Ming Chen Shuai-Min Chen Xinying Zheng Pei-Yu Chen Hung-Min Sun

RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the ...

2013
Il-Soo Jeon Eun-Jun Yoon

The security of RFID systems is a very important issue in the applications of RFID systems. Developing of authentication protocols is a general solution to * Corresponding author: e-mail: [email protected] (Eun-Jun Yoon) 3434 Il-Soo Jeon and Eun-Jun Yoon resist security attacks. However, since low-cost RFID tags have very limited hardware resources, it is not easy to develop an authentication pr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید