نتایج جستجو برای: protocol rfid

تعداد نتایج: 257823  

Journal: :IACR Cryptology ePrint Archive 2009
Dang Nguyen Duc Kwangjo Kim

In this paper, we propose a grouping-proof protocol for RFID tags based on secret sharing. Our proposed protocol addresses the scalability issue of the previous protocols by removing the need for an RFID reader to relay messages from one tag to another tag. We also present a security model for a secure grouping-proof protocol which properly addresses the so called mafia fraud atttack. Mafia fra...

2006
Dang Nguyen Duc Jaemin Park Hyunrok Lee Kwangjo Kim

In this paper, we present a synchronization-based communication protocol for RFID devices. We focus on the EPCGlobal Class-1 Gen-2 RFID tag which supports only simple cryptographic primitives like Pseudo-random Number Generator (PRNG) and Cyclic Redundancy Code (CRC). Our protocol is secure in a sense that it prevents the cloned tags and malicious readers from impersonating and abusing legitima...

Journal: :JCM 2015
Jingxian Zhou

—Many RFID authentication protocols have been developed in recent years. However, most require the reader to search all tags in the system to identify a single tag. This problem makes the protocols impractical in large-scale RFID deployments. To address this problem, we propose a privacypreserving mutual authentication protocol for RFID systems with constant-time identification, based on Quadr...

2015
Peter J. Hawrylak Mauricio Papa

Radio frequency identification (RFID) devices have matured to the point where they are now expanding beyond the retail supply chain and public transit fare management systems. RFID technology provides a low power and economical method to link remote sensors to larger control systems. In these cases, the RFID protocols provide the communication link between the sensor and larger control system. ...

Journal: :IACR Cryptology ePrint Archive 2015
Behzad Abdolmaleki Hamidreza Bakhshi Karim Baghery Mohammad Reza Aref

In the past few years, the design of RFID authentication protocols in accordance with the EPC Class-1 Generation-2 (EPC C1 G2) standards, has been one of the most important challenges in the information security domain. Although RFID systems provide user-friendly services for end-users, they can make security and privacy concerns for them. In this paper we analyze the security of an RFID mutual...

2004
Ari Juels

A radio-frequency identification (RFID) tag is a small, inexpensive microchip that emits an identifier in response to a query from a nearby reader. The price of these tags promises to drop to the range of $0.05 per unit in the next several years, offering a viable and powerful replacement for barcodes. The challenge in providing security for low-cost RFID tags is that they are computationally w...

2006
Yao-Yuan Liu Koong H.-C. Lin Tzu-Chang Yeh Chad Lin

Interests continue to grow in recent years for the adoption of Radio Frequency Identification (RFID) in many different areas including transportation and supply chain management. Those RFID-included objects can be targeted more efficiently by real-time tracking and instant management. However, because of the contact-less type of RFID remote retrieval, the transmission of data in the air is very...

2006
Hyun Seok Kim Il-Gon Kim Keun-Hee Han Jin-Young Choi

Radio frequency identification (RFID) is expected to become an important and ubiquitous infrastructure technology. As RFID tags are affixed to all items, they may be used to support various useful services. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy and authentication among communication participants. Security mechanisms for RFID...

2009
Dang Nguyen Duc Jangseong Kim Kwangjo Kim

In this paper, we propose a grouping-proof protocol for RFID tags based on (n, n)-secret sharing. Our proposed protocol addresses the scalability issue of the previous protocols by removing the need for an RFID reader to relay messages from one tag to another tag. We also present a security model for a secure grouping-proof protocol which properly addresses the so called mafia fraud attack (som...

Journal: :IACR Cryptology ePrint Archive 2011
Masoumeh Safkhani Nasour Bagheri Majid Naderi Somitra Kumar Sanadhya

Low cost Radio Frequency IDentification (RFID) tags are increasingly being deployed in various practical applications these days. Security analysis of the way these tags are used in an application is a must for successful adoption of the RFID technology. Depending on the requirements of the particular application, security demands on these tags cover some or all of the aspects such as privacy, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید