The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Radio-frequency identification (RFID) uses electromagnetic fields for wireless communication that automatically recognized target devices with no physical interaction with the purpose of information transmission. The RFID system composed of transponder or tag, interrogator and back-end host system. The services of mobile RFID (M-RFID) networks can be setup by consolidating with current wireless networking...
A Radio Frequency Identification (RFID) system is a contactless automatic identification system that uses small and low-cost tags. The restricted computation ability and limited memory space of low-cost tags make existing RFID systems vulnerable. EPC Class 1 Generation 2 (EPC-C1G2) is the most popular standard for low cost passive RFID tags. For improving security of this standard; many security schemes...
Radio Frequency Identification (RFID) has become a widespread technology to automatically identify objects and with the development of cloud computing, cloud-based RFID systems attract more research these days. Several cloud-based RFID authentication protocols have been proposed to address privacy and security properties in the environment where the cloud provider is untrusted therefore the tag's...
RFID (radio frequency identification) is a small electronic device that consists of small chip and an antenna. The biggest challenge for RFID technology is to provide benefits without degrading the secutiry level. This paper proposes a new RFID authentication protocol based on the lightweight stream cipher Enhanced-Bivium. In terms of security we show that the protocol is robust under the attack of...
The evolution of digital communication era includes both devices and applications running on different platforms. Specifics applications are needed for a safeguard communication ensuring protection and trust services to the users. The growing need to address privacy concerns when social network data is released for mining purposes has recently led to considerable interest in various network security-based...
With the advantage of long distance, high speed and low cost, the UHF RFID technology has become a hot research area of RFID and it will become a fundamental technology of future information society construction. Because of the openness of RFID, RFID application takes a risk of being attacked, security and privacy issues become a constraint bottleneck to its further development. To solve the existing...
The increasing demand to deploy efficient ways of identification has made Radio frequency Identification (RFID) technology ubiquitous. Due to the wireless nature of communication between the reader and the tag, this technology imposes major security and privacy threats. Massive work to design a powerful authentication protocol has been put to overcome various threats against privacy and security of...
The increasing demand to deploy efficient ways of identification has made Radio frequency Identification (RFID) technology ubiquitous. Due to the wireless nature of communication between the reader and the tag, this technology imposes major security and privacy threats. Massive work to design a powerful authentication protocol has been put to overcome various threats against privacy and security of...
The low cost RFID tags can be applied in new applications", "and interest more different groups of suppliers and end users, But the most important problem of low cost RFID system is that unauthorized readers can access to tag information and illegal tags can be authorized by legal readers, which should be potential to produce privacy and security problem. EPC Class1 Gen2 standard can be...
The dynamicity of ubiquitous application environment where devices are free to connect and disconnect has made it exposed to adversaries. Identity impostor, man-in-the-middle attack and unauthorized access are some of the threats posed by the potential adversaries. These threats exist due to the lack of good authentication protocol for ubiquitous application environment. As a result, some users are...
One of the key problems in RFID is security and privacy. The implementation of authentication protocols is a flexible and effective way to solve this problem. This letter proposes a new ultralightweight RFID authentication protocol with permutation (RAPP). RAPP avoids using unbalanced OR and AND operations and introduces a new operation named permutation. The tags only involve three operations: bitwise...
Many kinds of protocols have been designed to resolve the security and privacy problems of RFID systems. In this paper, we illustrate a new RFID authentication protocol based on Trivium, inspired from the Challenge-Response based RFID authentication protocol for distributed database environment. The proposed protocol can prevent many attacks including spoofing attack, replay attack, tracking and desynchronization...
RFID (Radio Frequency Identification) technology has been widely used in daily life, such as in access control, electronic passports, contactless credit cards, transportation, and animal tracking. However, this technology may cause various security and privacy problems, e.g. traceability of tag owner, malicious eavesdropping of tags and cloning of tags. In order to thwart these security and privacy...
Designing a security protocol for RFID systems is difficult because RFID tags have limited power-consumption and memory capabilities. A mutual authentication protocol based on a hash function helps prevent attacks against RFID systems.
In this paper, we investigate the security of a recently proposed RFID authentication protocol that needs O(1) time complexity to find out the identifier of the RFID tag irrespective of the total number of the tags. We exhibit a flaw which has gone unnoticed in design of the protocol and show that it makes the scheme vulnerable to tracking attack, tag impersonation attack and denial of service attack,...
One of the hottest issues in RFID system is to design low-cost and practical authentication protocol which is necessary. Many researchers have proposed some lightweight authentication protocols which only use lightweight operations to provide some security properties, such as mutual authentication, untraceability etc. In this paper, we analyze the security of an efficient authentication protocol,...
Lightweight authentication protocols are necessary in the RFID system because tags are lack of computational resources and communication ability. Many researchers have proposed some authentication protocols which only use lightweight operations, such as XOR, hash operation and so on. In this paper, we analyze some authentication protocols. Especially, we analyze a forward secure RFID privacy protection...
A scalable authentication protocol is proposed for security and efficient RFID communication. The performance evaluation and security analysis has proved its advantages. Compared with other protocols, it can preserve content and location privacy, resist replay attacks and Dos attacks, and has forward security and scalable.
Every year millions of Muslims from all around the world gather to perform their pilgrimage in Makkah, Saudi Arabia. Due to the massive number of pilgrims of different languages, cultures and countries, it is highly challenging for the authorities to manage and provide proper services to these pilgrims. In this paper, we propose a pilgrim tracking system with the help of Radio Frequency identification...
In this paper we address the issue of scalability in RFID pseudonym protocols. Many previously proposed protocols suffer from scalability issues because they require a linear search to identify or authenticate a tag. Some RFID protocols, however, only require constant time for tag identification, but, unfortunately, all previously proposed schemes of this type have serious shortcomings. We propose...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.