The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In view of simulation result degree of confidence based on the NS2 network performance, proposed a new approach based on confidence interval, and through the analysis of an actual system and the simulation model, showed the simulation results are credible under the high confidence level, has provided a beneficial reference for the degree of simulation confidence research.
Lightweight authentication protocols are necessary in the RFID system because tags are lack of computational resources and communication ability. Many researchers have proposed some authentication protocols which only use lightweight operations, such as XOR, hash operation and so on. In this paper, we analyze some authentication protocols. Especially, we analyze a forward secure RFID privacy protection...
Lightweight authentication protocols in the RFID system are necessary because the channel between the tag and reader is not secure and the tag has very limited computation resources, memory and power. Many researchers have proposed some lightweight authentication protocols in order to provide some security properties, such as mutual authentication, untraceability etc. In this paper, we firstly analyze...
Lightweight authentication protocols are necessary in the RFID system because the information security is important and tags lack computational resources, memory, power and communication ability. Many researchers proposed some lightweight authentication protocols which only use lightweight operations, such as hash function, XOR etc. In this paper, we analyze the security of protocols respectively...
As low-cost RFID tags with limited resource dominate in most of RFID applications, almost all security protocols used between the tag and reader are lightweight protocols which only need to implement some simple operations, such as hash function and XOR operation etc. In this paper, it is analyzed the security of different protocols based on the hash function. Afterwards, we find the A-SRAC protocol...
Lightweight authentication protocols are necessary in the RFID system because the tag lacks computational resources, memory, power and communication ability. This paper analyzes the security of different lightweight protocols in the HB protocol family and presents an active attack against the modified HB++ protocol proposed by Selwyn Piramuthu. According to this attack, the AUHB++ protocol is proposed...
With the development of communication technology, recently, a lot of attempts related to Intelligent Transport System have come forth at home and abroad. Based on the exploration of wireless communication in the intelligent public transport system, a hybrid model of GPRS and Bluetooth is provided which is fast, stable and secure and a new model of intelligent public transportation system is established...
In this paper we propose a two-way authentication and key agreement protocol which is used in the communication between RFID tag and reader. This protocol characterizes low computing complexity and is suitable for low-cost RFID tag. We extend Strand space and prove the security of the protocol. The result indicates this protocol has low computing complexity, high security and is appropriate for the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.