The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
RFID systems are being used in various pervasive applications. Therefore, security and privacy protection is an important issue that needs to be addressed. In this paper, we present a secure mutual authentication protocol for RFID systems that is based on symmetric key technique with an efficient key updating mechanism. The objective is to improve the system security against replay, eavesdropping...
The increasing demand to deploy efficient ways of identification has made Radio frequency Identification (RFID) technology ubiquitous. Due to the wireless nature of communication between the reader and the tag, this technology imposes major security and privacy threats. Massive work to design a powerful authentication protocol has been put to overcome various threats against privacy and security of...
The increasing demand to deploy efficient ways of identification has made Radio frequency Identification (RFID) technology ubiquitous. Due to the wireless nature of communication between the reader and the tag, this technology imposes major security and privacy threats. Massive work to design a powerful authentication protocol has been put to overcome various threats against privacy and security of...
RFID technology is being widely employed in various pervasive applications. Therefore, security and privacy protection for RFID systems is an important issue that needs to be addressed. In this paper, we present a secure mutual authentication protocol for RFID systems that is based on symmetric key technique with an efficient key updating mechanism. The objective is to improve the RFID system security...
RFID technology has been widely used in logistic, automation and authentication applications. It still has many potential issues of privacy and security. We present a novel XTEA encryption based authentication protocol. Analysis of its security and privacy is performed using FPGA based prototyping. Different attack models are implemented, and the results show that the protocol is robust and safe against...
Authentication of products and humans is one of the main applications of RFID technology. In this paper, we present a novel cryptographic authentication protocol that is fully secure and it fills the security holes imposed by RFID technology. Our proposed authentication protocol has a significantly lower cost in terms of computation, memory and communication as compared to most of the existing RFID...
RFID technology has been widely used in logistic, automation and authentication applications, but it still has many potential issues such as the risks of privacy and security. This paper presents a novel RFID security protocol based on XTEA algorithm. Analysis of the security and privacy of this novel protocol is performed using FPGA based prototyping platform. Different attack models are implemented,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.