نتایج جستجو برای: protocol rfid
تعداد نتایج: 257823 فیلتر نتایج به سال:
Radio Frequency Identification (RFID), which can be implemented in various applications, has become one of the most popular technologies for remote, automatic identification. Currently, many scientific researchers are focused on this issue with the goal of achieving high security and privacy protection. Recently, Chen et al. proposed an RFID access control protocol that can satisfy the practica...
This paper presents a comparison of version 1.0 Protocol Specification for 900MHz Class 0 RFID Tag with that of Class-1 Generation 2 UHF RFID Protocol for Communications at 860 MHz – 960 MHz for large number of tags. Although the Generation 2 protocol has been released for Class 1, it is intended to be used by all classes of RFID tags. Using detailed simulation we compare their performance and ...
In Information Processing Letters 110 (2) (2009) 57-61, Deursen and Radomirović evaluated five formal RFID privacy models. One main result is that Ha et al.’s RFID privacy model is incorrect. The supporting fact is that a constant-response protocol cannot pass the test of Ha et al.’s RFID privacy model. However, we demonstrate that the constant-response protocol is artificial, and the correspon...
Tag cost and privacy of RFID technology are two main factors that determine whether it will be applied to Internet of Things on a large scale. Recently, RFID industry and research community have focused on RFID authentication protocols with provable privacy and low tag cost. In this paper, we propose an RFID security protocol that achieves all security requirements based on a hash function and ...
RFID is a key technology that can be used to create the ubiquitous society. However, this technology may suffer from some serious threats such as privacy disclosure. In order to solve these secure problems we propose a strong mutual authentication protocol based on a lightweight public-key cryptosystem: NTRU. The protocol assures the confidentiality of the RFID system by encrypting the messages...
This paper proposes a novel type of RFID application, i.e., RFID seeking. Several existing types of RFID applications such as monitoring, searching, locating/navigating, are similar with RFID seeking. However, they are either inapplicable or vulnerable for RFID seeking scenarios, in which a user is to find a lost tagged item in a blind spot, or to find a wanted item among a mass of similar ones...
Electronic seal is an electronic device to check the authenticity and integrity of freight containers at the point of arrival. While RFID-based eSeals are gaining more acceptances and there are also some standardization processes for these devices, a recent research revealed that the current RFID-based eSeals are vulnerable to various attacks. In this paper, we provide a feasible solution to en...
Radio Frequency Identification (RFID) systems are emerging as a practical means of auto-identification in a wide variety of applications in the modern era and as one of the most pervasive computing technologies in history. A typical RFID system is usually composed of four parts: tag, RFID reader, RFID middleware and application system. The host system seeking between the hardware and the enterp...
In the coming pervasive society, Radio Frequency Identification(RFID) Tags will be affixed within every product and object including human. This technology is anticipated to be a major technology which will be utilized by several pervasive services where these tags will be used to identify various objects. However, the use of RFID tags may create new threats to the security and privacy of indiv...
In this paper, we propose an enhanced version of the HB-MP authentication protocol, called the HB-MP protocol. The HB-MP protocol is a lightweight authentication protocol that is suitable for use in passive radio frequency identification (RFID) systems. The HB-MP protocol overcomes the man-in-the-middle attack to which the basic HB-MP protocol is vulnerable while maintaining its suitability to ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید