The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Much research has been done on preserving RFID tag owner's location privacy. This research has produced various RFID tag ownership transfer protocols. Since these protocols operate across various entities in a distributed manner, they should exhibit ownership atomicity. More often than not, ownership transfer could precede or succeed payment transfer. In this paper, we introduce a novel commerce environment,...
Although widely used in various applications, the current RFID (Radio Frequency Identification) systems lack efficiently enforcement of security and privacy. Furthermore, considering that the bearer of a RFID tag might be changed, the ownership transferring of the tags also becomes an issue. Some schemes have been suggested, but they are lack of participation of people. In this paper, we propose a...
In this paper, we present the performance evaluation of a passive UHF RFID Blocking Reader when worn on a human body. A Blocking Reader(BR) is a privacy protection device whose primary purpose is to legally prevent other readers from reading passive UHF RFID tags in its vicinity. When worn on your body, a Blocking Reader creates a Privacy Zone that prevents unauthorized readers from reading or communicating...
Radio Frequency Identification (RFID) systems employ pervasive, low-cost devices to identify physical objects and track item movements. The integration of sensors into RFID tags has recently generated a lot of interest among the RFID community. Integrating automatic identification and sensors at the RFID tag hardware level not only provides an identity to an object but also provides information regarding...
The pervasiveness of RFID technology raises some issues regarding security and privacy. Untrusted RFID system poses security threat because secret information can be revealed to any adversary platform by unverified applications or components inside the RFID system itself. The unverified applications can be compromised either by any virus or man in the middle attack. In order to strengthen the system...
Counterfeit products cause financial losses and represent a health risk. Within RFID-enabled supply chains, where products are equipped with RFID tags, clone detection mechanisms based on tag traces can help in detecting counterfeits. These mechanisms assume that supply chain partners share (private) information to run trace analysis, and may suffer from supply chain dynamics, tag misreads, product...
RFID technology is increasingly being deployed in ubiquitous computing environments for object tracking and localization. Existing tracking architecture usually assumes the use of a trusted server which is invulnerable to compromise by internal and external adversaries. However, maintaining such a trusted server is unlikely in the real world. In this paper, we consider the problem of adding privacy...
Radio Frequency IDentification (RFID) technology has attracted much attention due to its variety of applications, e.g., inventory control and object tracking. One important problem in RFID systems is how to quickly estimate the number of distinct tags without reading each tag individually. This problem plays a crucial role in many real-time monitoring and privacy-preserving applications. In this paper,...
Every year millions of Muslims from all around the world gather to perform their pilgrimage in Makkah, Saudi Arabia. Due to the massive number of pilgrims of different languages, cultures and countries, it is highly challenging for the authorities to manage and provide proper services to these pilgrims. In this paper, we propose a pilgrim tracking system with the help of Radio Frequency identification...
Power consumption is a key element in the design of secure RFID systems. It is a major resource constraint for cryptographic primitives, a sidechannel that can expose sensitive data, and a determinant of read ranges for tags. While protocol design for high-powered, networked computing devices can conveniently disregard power considerations, energy consumption is an unavoidable dimension of RFID-tag...
Most of the sources of security and privacy issues in RFID technology arise from the violation of the air interface between a tag and its reader. This paper will approach the security risk analysis process from the perspective of the RFID tag life cycle, identify the tag usage processes, identify the associated vulnerability and threat to the confidentiality, integrity and availability of the information...
This paper focuses on the challenges on the privacy of Radio Frequency Identification (RFID) systems. RFID systems have already widely applied in industry and have been bringing lots of benefits to our daily life, it also creates new security and privacy problems to individuals and organizations. The security and privacy challenges are analysed after a brief introduction of various RFID systems and...
In a true ubiquitous world, RFID tags will be available in everything, everywhere, and at all times. However, since those tags are bounded with constraints, with no foolproof method to manage the changing hands of the same-tagged item, there is no assurance of privacy and security in passive tags. Yet there are several vender specific solutions but none of them comprehensively solve the security risks...
RFID (radio frequency identification) is one of the most promising NFC (near field communication) technologies for pervasive and ubiquitous network societies in recent year. The main factor for more and more interests from both industry and academic institutes is due to the lower and lower costs, which may pose a threat to information security while RFID become part of our daily life because the lower...
Radio frequency identification (RFID) systems will soon become an important part of everyday life. However, widespread deployment of RFID tags may create new threats to user privacy, due to the powerful tracking capability of the tags. Security mechanisms for RFID systems will be therefore of utmost importance. In this paper, we describe problems of previous works on RFID security protocol and specify...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.