نتایج جستجو برای: protocol rfid

تعداد نتایج: 257823  

Journal: :Int. J. Computational Intelligence Systems 2012
Ya-li Liu Xiaolin Qin Bo-Han Li Liu Liang

Designing secure and robust gr ouping-proof protocols based o n RFID characte ristics becomes a hotspot in the research of security in Internet of Things (IOT). The proposed grouping-proof protocol s recently have security and/or privacy omission and these schemes afford order-dependence by relaying message among tags through an RFID reader. In consequence, aiming at enhancing the robustness, i...

2014
Zhicai Shi Josef Pieprzyk Christophe Doche Yongxiang Xia Yu Zhang Jian Dai

RFID is an important technology that can be used to create the ubiquitous society. But an RFID system uses open radio frequency signal to transfer information and this leads to pose many serious threats to its privacy and security. In general, the computing and storage resources in an RFID tag are very limited and this makes it difficult to solve its secure and private problems, especially for ...

2007
Seongan Lim Ikkwon Yie

To assure the privacy of RFID Tags, symmetric challenge-response identification protocols have been considered. Due to the low cost requirements for tags, it has been assumed that the tampering of RFID tags is possible. In this paper, we estimate the privacy leakage of challenge-response RFID authentication protocols based on symmetric key using discrete probability under the assumption that ta...

2005
Jeongkyu Yang Jaemin Park Hyunrok Lee Kui Ren Kwangjo Kim

Radio frequency identification (RFID) is the latest technology to play an important role for object identification as a ubiquitous infrastructure. However, current low-cost RFID tags are highly resource-constrained and cannot support its long-term security, so they have potential risks and may violate privacy for their bearers. To remove security vulnerabilities, we propose a robust mutual auth...

2011
Süleyman Kardas Serkan Çelik Atakan Arslan Albert Levi

Radio Frequency IDentification (RFID) systems are getting pervasively deployed in many daily life applications. But this increased usage of RFID systems brings some serious problems together, security and privacy. In some applications, ownership transfer of RFID labels is sine qua non need. Specifically, the owner of RFID tag might be required to change several times during its lifetime. Beside...

Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...

2014
Minghui Wang Junhua Pan

To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authenticat...

Journal: :Electr. Notes Theor. Comput. Sci. 2009
Ton van Deursen Sasa Radomirovic

In the context of Dolev-Yao style analysis of security protocols, we investigate the security claims of a proposed strong-security RFID authentication protocol. We exhibit a flaw which has gone unnoticed in RFID protocol literature and present the resulting attacks on authentication, untraceability, and desynchronization resistance. We analyze and discuss the authors’ proofs of security. Refere...

Journal: :Malaysian Journal of Computer Science 2023

In addition to its benefits, the popular Internet of Things (IoT) technology has also opened way novel security and privacy issues. The basis IoT starts with trust in hardware supply chain. Counterfeiting, cloning, tampering hardware, theft, lost issues chain have be addressed, order ensure reliable industry growth. four previous works, radio-frequency identification (RFID)-enabled solutions be...

Journal: :IACR Cryptology ePrint Archive 2012
Shao-hui Wang Sujuan Liu Dan-wei Chen

Privacy of RFID systems is receiving increasing attentions in the RFID community and an important issue required as to the security of RFID system. Backward privacy means the adversary can not trace the tag later even if he reveals the internal states of the tag sometimes before. In this paper, we analyze two recently proposed RFID authentication schemes: Randomized GPS and Randomized Hashed GP...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید