The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Supply chain is a typical scenario of exploiting Radio Frequency Identification (RFID) technology. Its growing use in all the supply chain areas makes the presence of many close RFID readers more common. In such environment, interferences among readers are critical. Many protocols have been proposed to reduce reader-to-reader collisions. Experimental data showed that the Neighbor Friendly Reader Anticollision...
Radio frequency identification technology has been increasingly used in many applications. However, there are many threats and security risks in the RFID systems since an insecure wireless channel exists between the reader and the tags. The security of RFID protocols must be designed and proved with careful cryptanalysis. In this paper, we analyze some RFID authentication protocols proposed recently...
A mass of RFID authentication protocols have been proposed to address the privacy and security problems in RFID systems. In Asiacrypt 2007, Vaudenay presented a general security and privacy model that abstracts most previous protocols. This paper propose two anti-cloning and secure RFID mutual authentication protocols based on Vaudenay's security and privacy model. Regarding security, privacy and...
Formal analysis techniques are widely used today in order to verify and analyze communication protocols. In this work, we launch a quantitative analysis for the low-cost Radio Frequency Identification (RFID) protocol proposed by Song and Mitchell. The analysis exploits a Discrete-Time Markov Chain (DTMC) using the well-known PRISM model checker. We have managed to represent up to 100 RFID tags communicating...
RFID-based indoor location systems have been proved to be both accurate and cost-effective. However, current implementations mainly use active tags which suffer the issues of batteries replacement, installation, maintenance and per-unit cost. Besides, as the number of users grows, how to guarantee the stability and high speed transmission of the location information can be challenging. To address...
Radio Frequency Identification (RFID) technology is becoming widely used in our daily life. However, since RFID tags have extremely limited computational and storage ability, many RFID authentication protocols have security and privacy problems. In this paper, we analyze an anonymous RFID authentication protocol proposed in WiCOM'09 and find its security drawbacks. Then, we give an improved forward-secure...
When embedded in consumer goods, RFID (Radio-Frequency IDentification) tags often suffer from risking customer privacy, especially after the transactions being completed, which makes designing excellent RFID tag ownership transfer protocols more urgent than ever. We propose a hash-based method, TPOT, to transfer RFID tag ownership to customers. For tag owners' privacy protection, our scheme lets readers...
Low-cost radio frequency identification (RFID) communication system is exposed to various security and privacy threats. Most of the previous studies focused on prevention techniques to protect RFID communication system from eavesdropping, impersonation and data leakage problems. This paper proposes the use of both prevention and detection techniques to improve and solve the security issues. A mutual...
In the last few years, a plethora of RFID authentication protocols have been proposed and several security analyses have been published creating the impression that designing such a protocol must be, more or less, a straightforward task. In this paper, we investigate the security of two recently proposed schemes, showing that designing a secure RFID authentication protocol is still a demanding process...
Chen, Tsai, and Jan (Chen et al. for short) recently proposed a Radio Frequency Identification (RFID) access control scheme, which includes an authentication mechanism and an access right authorization mechanism designed for a low-cost RFID system. Chen et al. does not only show security weaknesses of Weis's and Chien's access control schemes, but also claim their proposed scheme can resist the man-in-the-middle...
RFID technology has been widely used in logistic, automation and authentication applications. It still has many potential issues of privacy and security. We present a novel XTEA encryption based authentication protocol. Analysis of its security and privacy is performed using FPGA based prototyping. Different attack models are implemented, and the results show that the protocol is robust and safe against...
Authentication of products and humans is one of the main applications of RFID technology. In this paper, we present a novel cryptographic authentication protocol that is fully secure and it fills the security holes imposed by RFID technology. Our proposed authentication protocol has a significantly lower cost in terms of computation, memory and communication as compared to most of the existing RFID...
RFID technology has been widely used in logistic and authentication applications, but it still has many potential issues such as the risks of privacy and security. This paper presents a novel RFID security protocol based on the XTEA encryption. Analysis of the security and privacy of this novel protocol is performed using SystemC based modeling. Different attack models are implemented, and the results...
Radio Frequency Identification(RFID) system is a contactless automatic identification system using small, low-cost RFID tags. It enables recognition of the tag information via radio frequency communication, by attaching an RFID tag to an animate or inanimate object. Therefore, RFID system expected widely used in the object recognition and u-healthcare. The most important problem with an RFID system...
This paper describes a prototype of a wireless sensor network developed for tracking pilgrims in the Holy areas during Hajj (Pilgrimage). A delay tolerant network principle is used. Energy efficiency, robustness, and reliability are the key factors for the developed system. Every pilgrim will be given a mobile sensor unit that includes a GPS unit, a Microcontroller, antennas and a battery. A network...
RFID technology automates several types of objects identification processes and improves lots of business transactions. Its ability to communicate through wireless networks gives huge advantages in comparison to optical barcode and manual identification systems. Unfortunately, the ability of RFID system to communicate through wireless communication opens up possibilities of being tracked by unauthorized...
NFC technology can be integrated into existing systems to simplify and speed up the process of monitoring and control of these systems. In this paper we address a problem pertaining to the complexity of the monitoring and control of sensor or measurement equipment. Manual monitoring of measurement systems can be a tedious endeavor, especially in systems where the measurements are numerous and at regular...
RFID (Radio Frequency Identification) technology has been widely used in daily life, such as in access control, electronic passports, contactless credit cards, transportation, and animal tracking. However, this technology may cause various security and privacy problems, e.g. traceability of tag owner, malicious eavesdropping of tags and cloning of tags. In order to thwart these security and privacy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.