The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we analyze storage awareness RFID authentication protocol based on sparse tree structure (SAPA), which provides backward untraceability and reduces the space for storing key sequence. We discover that SAPA does not provide location and information privacy between successful authentication sessions and does not resist denial of service attacks, forward traceability, and server impersonation...
With increase in applicability of RFID technology, there is ever growing demand for security. The popularity of RFID applicability lies in its ability for automatic identification and low-cost of RFID tags. Most of the recent security protocols for RFID technology are based on cryptographic hash-based function which currently cannot be implemented on low-cost RFID tags. In this paper, we present a...
This paper describes a possible implementation for the innovative and highly secure networking architecture dedicated to the Internet of Things (IoT). We propose an infrastructure that works with a new type of tags, supporting the upcoming standard Host Identity Protocol (HIP). Our main concern is to ensure RFID tags privacy, while enabling things to things communications.
Nowadays, there are many active studies and applications of RFID authentication protocol. Because RFID communicates wirelessly without contacting a reader, its communicated information is more likely to be exposed compared to ordinary wired communication area. Communicated information can be easily eavesdropped by external attacks and such stolen information can be used for malicious purpose, which...
In this paper we address the issue of scalability in RFID pseudonym protocols. Many previously proposed protocols suffer from scalability issues because they require a linear search to identify or authenticate a tag. Some RFID protocols, however, only require constant time for tag identification, but, unfortunately, all previously proposed schemes of this type have serious shortcomings. We propose...
In its current form, RFID system are susceptible to a range of malevolent attacks. With the rich business intelligence that RFID infrastructure could possibly carry, security is of paramount importance. In this paper, we formalise various threat models due tag cloning on the RFID system. We also present a simple but efficient and cost effect technique that strengthens the resistance of RFID tags to...
Future applications of RFID technology will require creation of complex reader networks. Readers used today are not suitable for this task due to lack of interoperability. Hardware and software of different vendors is incompatible and makes applications hardly portable and scalable. In this paper new concept of RFID network structure is proposed. First, readers should be integrated in a special bus,...
In this paper, we propose a novel Radio Frequency Identification (RFID) system to preserve privacy and enhance security by using the public key cryptography method. In the proposed architecture, the access rights of the tags are controlled by a backend server. These improve security of the system and remedy privacy problems. We analyse security of the proposed system and demonstrate its robustness...
The mobile radio frequency identification (MRFID) system, defined as a special type of mobile service using RFID tag packaging object and RFID readers attached to mobile RFID terminals, has been studied actively in recent years. While the mobile RFID system has many advantages, the privacy violation problems at reader side, consumer tracking with malicious purpose and the sensitive information transmission...
At the onset of the ubiquitous computing era, systems need to respond to a variety of challenges, in order to capitalize on the benefits of pervasiveness. One of the pivotal enablers of pervasive computing is the RFID technology which can be successfully applied in numerous applications. However, the interaction of such applications with sensitive personal data renders the need for assuring confidentiality...
RFID system is gaining popularity and attracting interest from both the enterprises and academic institutes. But now, we face several security problems and challenges in RFID systems. In human centric applications, location privacy problem is the most important issue that should be solved. In this paper, we propose a RFID authentication scheme that achieves the goal of location privacy. We also cite...
RFID is a convenient and efficient mechanism used for identification or authentication in industry, agriculture, commerce, health care, entrance control, etc. Most of the RFID systems need security mechanisms for authentication and privacy protection. In 2004, Gao et al. propose a RFID system for supply chain, their system has drawbacks on security. Recently, Chen et al. proposed an improvement to...
We propose a novel tag selection algorithm to improve the efficiency of tag arbitration in RFID systems. Based on the probability that a given tag is located in the sensing range of the reader, our algorithm involves two steps. First, tags with higher probabilities are selected and directly arbitrated by their IDs, in order to eliminate the collisions caused by multiple tag replies and reduce the...
Nowadays, RFID (Radio Frequency Identification) mobile middleware technology is gaining growing attention due to its competitive business prospect and value. With the ability to be automatically identified and collect information, RFID mobile systems have been applied to various fields. Meanwhile, advancements in wireless communication technology have greatly increased the functionality of mobile...
A large scale implementation of RFID technology in many practical applications including supply chain and retail stores require the resolution of the either-or dichotomy between low-cost RFID tags and secure RFID systems. This research proposes an approach in which the complexity and hence the cost of RFID tags can be drastically reduce by eliminating the security-assuring computational resources...
After the worldpsilas largest retailer, Wal-Mart, has implemented RFID (Radio Frequency Identification), the global suppliers are actively devoted to EPC (Electronic Product Code) research and development. Since RFID has advantages of a long life, safe, and free from environmental constraints, RFID EPC can achieve benefits such as saving manpower costs, expressing logistics management, reducing man-made...
Low cost radio frequency identification (RFID) like EPC Gen 2 is one kind of most popular RFIDs in the market. However, as studied by several researchers, Gen 2 is not secure. Therefore, many researchers have devoted to improving the security. However, in addition to the fact the security of these improved schemes are still questionable, these solutions inevitably increase the cost of tags and inevitably...
In this paper we propose two mutual authentication protocols for RFID systems. Generally, in RFID systems, a reader can authenticate tags in the real-time and batch modes. This paper proposes the first authentication protocol for the real-time mode. It also proposes an efficient robust mutual authentication protocol for the batch mode. Some significant characteristics of the protocols are forward...
In this paper, we integrate radio frequency identification (RFID), and SIP express router (SER) to create a VoIP system which can achieve personal mobility. In our proposed system, as soon as the user moves to different locations, the sensors of the doors/locations can read the RFID tag of the user and the server can activate an according phone and register to the SER immediately. To avoid multiple...
Security is one of the main issues to adopt RFID technology in daily use. Due to resource constraints of RFID systems, it is very restricted to design a private authentication protocol based on existing cryptographic functions. In this paper, we propose a new RFID authentication protocol. The proposed protocol provides better protection against privacy and security threats than those before. Our proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.