The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper depicts the current situation of the development of the Internet of Things(IoT). RFID system is vulnerable to various attacks, because there is no physical or visible contact in its communication process. The research on security and privacy domain also increasingly causes the attention of academia. And this paper is mainly underlined that security and privacy issues exist ubiquitously,...
With the extensive application of RFID technology, people pay more and more attention to its security and privacy issues. Currently, security issues have become major factors which impede the large-scale applications of RFID technology. In this paper, security issues existing in RFID system are analyzed and the main authentication mechanisms proposed at home and abroad are analyzed and compared, and...
The pervasiveness of RFID technology raises some issues regarding security and privacy. Untrusted RFID system poses security threat because secret information can be revealed to any adversary platform by unverified applications or components inside the RFID system itself. The unverified applications can be compromised either by any virus or man in the middle attack. In order to strengthen the system...
Every year millions of Muslims from all around the world gather to perform their pilgrimage in Makkah, Saudi Arabia. Due to the massive number of pilgrims of different languages, cultures and countries, it is highly challenging for the authorities to manage and provide proper services to these pilgrims. In this paper, we propose a pilgrim tracking system with the help of Radio Frequency identification...
Most of the sources of security and privacy issues in RFID technology arise from the violation of the air interface between a tag and its reader. This paper will approach the security risk analysis process from the perspective of the RFID tag life cycle, identify the tag usage processes, identify the associated vulnerability and threat to the confidentiality, integrity and availability of the information...
Radio frequency identification (RFID) systems have been aggressively deployed in a variety of applications. RFID security and privacy issues have been intensively studied in the research field, of which the authentication between RFID reader and tag is the fundamental theme. Most of the existing authentication protocols draw assumptions on classic cryptographic primitives. However, for extremely resource...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.