The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to protect privacy of RFID tag against malicious tag tracing activities, many RFID authentication protocols with the secret key update scheme have been proposed to support forward security. These proposals are symmetric key based in common due to the lack of computational resource to perform heavy asymmetric cryptographic operations in low-cost tags. In this paper, we have demonstrated that...
Radio Frequency Identification (RFID) technologies have been standardized and widely commercially used, but its security problem is a major challenge. This paper presents an efficient authentication approach to prevent tag from eavesdropping by attackers, tracing by illegal reader. It firstly gives a comprehensive discussion of privacy problems, then presents a mutual authentication and encrypts communication...
A way of creating Radio Frequency Identification systems more secure relies on cryptography. Taking into consideration the security and privacy of RFID systems, this paper outlines a chaotical matter on the RFID protocols, by pointing out essential issues: discovering what types of RFID protocols of identification or authentication are most recommended to various RFID systems. Critical examinations...
In this paper, we introduce a secure communication protocol for tag authentication and data access authorization in EPCglobal Class 1 Generation 2 (EPC GEN-2) RFID systems. The proposed protocol adopts a process-oriented design to exploit the memory space at tag and backend server ends more efficiently. Based on the formal logic proof and protocol analysis, our scheme not only provides data confidentiality...
In this paper, we present the Blocking Reader, a low-cost privacy protection device that prevents unauthorized reading of RFID tags. The promiscuous nature of the 18000-6C RFID tags poses a threat to personal security and privacy. Privately owned tags on a person can be read by all nearby readers without that person's consent or knowledge, thereby, violating that person's privacy. A low cost privacy...
In the Project ??Semantic Product Memory?? we exploit the lessons learned so far for the general design of a Digital Product Memory (DPM). DPMs can be used along their product's life cycle to collect data by different instances. In case of the individualized weekly medicament blister for patients from 7 ?? 4 Pharma not only the collected data but even the product itself is private. If we equip such...
Security concerns and privacy infringement can be serious problems in many applications of radio frequency identification (RFID) systems. Most of the problems are due to the lack of user control over the communication between RFID tags and readers. Giving the user control over the RFID link can alleviate potential security problems. A simple smart card that prevents unauthorized credit card payment...
In this paper, we propose an identity aware video analytic system that can assist securing the perimeter of a mass casualty incident scene and generate identity annotated video records for forensics and training purposes. Establishing a secure incident scene perimeter and enforcing access control to different zones is a demanding task for current video surveillance systems which lack the ability to...
A scalable authentication protocol is proposed for security and efficient RFID communication. The performance evaluation and security analysis has proved its advantages. Compared with other protocols, it can preserve content and location privacy, resist replay attacks and Dos attacks, and has forward security and scalable.
Radio-frequency identification (RFID) technology is widespread developed and common for vehicle management in intelligent community. However, smart card used as the sole certificate of identification could also be impersonated by criminals when the card is lost or stolen. In this paper, an improvement design to the current widely-used vehicle monitoring systems, which utilize the RFID technology to...
Security and privacy issues are critically important in RFID networks because EPC data and their associated business events are valuable assets. In this paper, an Interoperable Internet-Scale Security (IISS) framework for RFID networks is proposed. The IISS framework performs authentication and authorization based on an aggregation of business rules, enterprise information, and RFID tag information...
The efficient and reliable handling of replacement parts is of high importance for airlines. It can be supported by attaching an RFID tag to replacement parts that stores data identifying unambiguously the replacement part and further information about its installation and maintenance. Security is essential so that only authenticated and authorized entities can read and modify data according to the...
In order to secure RFID transactions, an authentication scheme has originally been included as part of the "EPC Gen2" industrial standard. This scheme, however, has been found to have some weaknesses. To overcome such weaknesses, some authors have proposed new schemes to improve its security. Two of the latest proposals are the Lim-Li protocol and the Konidala-Kim-Kim protocol presented...
RFID (radio frequency identification) is the key technology to open the new era of computing history, i.e., machine perception or sensor age. However, one major stumbling block of using RFID technology in ubiquitous environment is the lack of security enforcement. In this paper, we introduce a systematic approach to enhance RFID middleware with the access control, user authentication, and session...
The paper introduces the structure of the EPC network, analyzes the potential security problems of the EPC network information service (EPCIS). Expatiates the light PKI EPCIS trust model based on PKI, the proposed light PKI trust architecture is much simpler and efficient. Put forward a based on the enterprise trust and collaboration model (ETCM) and the search algorithm of the trust corporate relations...
In recent years, radio frequency identification (RFID) technology has been developing rapidly worldwide due to its convenience and efficiency. However, the security issues cannot be ignored when enterprise adopts RFID technology. It needs to take into consideration of the suitable access control mechanisms for RFID. The traditional role-based access control model (RBAC) is not robust enough to deploy...
Recently, home intelligent service is extended to context aware and situation aware automation service by using ubiquitous technology. This paper designs a ubiquitous computing based smart home safety management (U-SHM) for digital life. The proposed scheme integrates RFID and context awareness technologies in ubiquitous environments to increase the efficiency of mobile commerce and improve the life...
RFID technology is widely used worldwide in a broad range of applications. Such technology however raises security concerns about the protection of the information stored in the RFID tags and exchanged during the wireless communication with the readers. In this work we propose an efficient protocol for tag identification which improves on previous proposals and provides an increased level of security,...
This paper presents an RFID-enabled electronic kiosk system for personalized information retrieval. The system builds on research in direction-giving by streamlining the process and therefore providing the user with a quicker transaction for personalized information. The RFID technology also provides potential for greater security and privacy for the user. The RFID prototype is built on top of a current...
RFID's wireless identification capabilities promise to revolutionize our industrial, commercial, and medical experiences. The heart of the utility is that RFID makes gathering information about physical objects easy. Middleware plays a key role to deliver tag data in real time, which resides between readers and enterprise applications in RFID systems. Therefore, the middleware should be controlled...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.