The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a practical implementation of a digital baseband for a low-cost UHF Radio Frequency Identification (RFID) tag, in which a cryptography engine based on International Data Encryption Algorithm (IDEA) primitive is embedded. A mutual authentication scheme enforced by the IDEA engine is proposed. The scheme can improve the security of the ISO 18000-6C protocol and meet the timing constraints...
Given the security and privacy problems in the application of Radio Frequency Identification(RFID), this paper is proposed a kind of novel security framework, aiming to find a better mechanism in security and privacy problems. It is worth mentioning that this paper draws Agent and Trusted Computing technology into the design of RFID system, whose superiority in authentication is used to solve the...
The primary goal of RFID middleware as a tool of item management is to provide a series of filtered tag data to the RFID-based applications. The middleware also provides a means of specifying event-constraints in order to filter a huge number of raw data cought from the associated RF readers. In terms of specifying the RFID event-constraints for the applications' events refinement, the current specifications...
Security and privacy issues are critically important in RFID networks because EPC data and their associated business events are valuable assets. In this paper, an Interoperable Internet-Scale Security (IISS) framework for RFID networks is proposed. The IISS framework performs authentication and authorization based on an aggregation of business rules, enterprise information, and RFID tag information...
One of the main challenges in ubiquitous networks is localization. Many positioning methods have been proposed in the literature since this data is critical for numerous protocols and services. Choosing the right localization algorithm for a specific environment is a hard task. However, it is even more complex when several radio access technologies are available in evolving environments. This paper...
The aim of this paper is to invent a security system against motorcycles theft by using RFID (radio frequency identification) technology. It is based on RFID technology on ultra high frequency range (905-925 MHz) which can be applied to use in access control by using RFID tag attached to motorcycles. Additionally, the system can be modified to use for protecting other kinds of assets stealing such...
It is estimated that over 3 billion radio frequency identification (RFID) tags have been deployed through 2007. Most tags are used in supply chains where the electronic product code (EPC) and associated business event data are transmitted through RFID networks. Security and privacy issues are critically important in RFID networks because EPC data and their associated business events are valuable assets...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.