The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper a system for increasing children's safety is proposed. The focus is on the daily route from home to school and vice versa, assuming the use of school buses. IoT paradigm is exploited together with different localization techniques i.e. RFID and GPS, in order to design a solution for parents willing to make certain of their child's following the main steps to school or home, i.e. taking...
In spite of the availability of digital password lockers and advanced door locks, hacking the lock code by an unauthorized person has become a plain-sailing task. Various electronic locks are currently available in the market based on Password, RFID, Biometrics, OTP, Cryptography, Wireless and IoT. Every system has its own advantages and disadvantages where one system overcomes the limitations of...
Radio Frequency Identification (RFID) makes it a supporting technology for the Internet of things (IoT). While RFID has been widely used and developed rapidly, its security and privacy issues cannot be ignored. With the development of cloud computing, cloud based RFID system has become a new solution. Protecting the security of RFID system in cloud environment is particularly important. Not verifying...
Thanks to their crucial role in different areas such as supply chain and healthcare, Radio Frequency Identification (RFID) technologies have currently attracted a lot of attention. They are mainly used for identifying objects and people based on a combination of tags and readers. Nevertheless, this identification brings out many challenges and concerns including security which still remains an open...
The system proposed is a door unlocking system containing multiple doors any of which can be used to access a certain zone e.g. a laboratory or library. The system is implemented using a central server which contains a central database gathering all the information about the authorized personnel. The hardware components required are RFID reader, passive RFID tags, wireless transmitter & receiver...
Recently, different RFID authentication protocols conforming to EPC Class 1 Generation 2 (EPC C1 G2) standard have been proposed. In 2013, Xiao et al. have proposed an improved mutual authentication protocol which claimed to eliminate the weaknesses of Yoon's protocol that has been proposed in 2012. In this paper, we study the security and the privacy of Xiao et al.'s protocol. It is shown that their...
In the last decade, various types of RFID security schemes have been proposed which have tried to provide all security and privacy requirements of end-users. In this paper, we cryptanalyze two new-found key exchange and key agreement security schemes which are proposed by Zhang et al. and Kim in 2012 and 2013 respectively. We present the reveal secret parameter, tag impersonation and traceability...
Among the Organized crime, Human trafficking hold third place where as the first and second or drug and weapon trade across the globe. Human trafficking is a shame on Humanity. As per the report of Human Rights commission of India over 40,000 children are reported missing every year of which 11000 are untraced [1][2]. Another statics report saying 80% of human trafficking is done for sexual exploitation...
Nuclear facilities need very strict security mechanism to prevent unauthorized persons from gaining access to critical facility or approaching close enough to harm the facility. Physical Access Control System plays an important role in ensuring the entry of authorized personnel into the premises. There are so many ways by which this system can be designed and implemented, wherein the authenticity...
Tag Authentication is an essential issue in RFID system which is wildly applied in many areas. Compared to the per-tag-based authentication, the batch-mode authentication has better performance for complex applications. However, many existing batch authentication protocols suffer from security and privacy threats, low efficiency problem or high communication and computation cost. In order to solve...
Radio Frequency Identification (RFID) ownership transfer protocol aims at securely updating RFID tag's internal state and key such that only the current owner of a tag is allowed to access the tag when it is transferred from one owner to the next. Doss et al. [32] proposed two very promising RFID ownership transfer protocols which represented state of the art and were claimed to own excellent security...
The aim of the Object name services (ONS) project was to find a robust and stable way of automated communication to utilize name and directory services to support radio-frequency identification (RFID) ecosystem, mainly in the way that can leverage open source and standardized services and capability to be secured. All this work contributed to the new RFID services and Internet of Things (IoT) heterogeneous...
The mobile revolution has distorted the lives of people, providing not just communication but also basic financial access in the form of phone based money transfer and storage. With the emerging mobile technology innovations, making use of mobile as a virtual device for online transactions has overcome the effort to be put for physical transactions as mobile phone is used with a great versatility...
In the RFID (Radio Frequency Identification) system, the communication between the reader and tags is vulnerable to attacks due to the nature of RF signals. Typical attacks include the forged-server, forged-tag, man-in-the-middle (MitM), tracking, replay, forward secrecy and denial of service (DoS) attacks. Some mutual authentication schemes/protocols have been proposed to resist these attacks. Unfortunately,...
Aiming at the current problems in the confidential meetings, RFID technology, combined with communication technology, the system integration technology, database technology and lifecycle management technology is applied. In this paper, we design a set of multi-functional Monitoring System of Confidential Meetings to solve the problem. The system contains Basic Information Management, Confidential...
Authentication in Radio Frequency Identification (RFID) technology is an important requirement. Attachment of single tag in an object has less detection probability since the attached tag may not be within the communication range. Use of multiple numbers of tags in an object solves this problem and increases the detection probability. Many authentication schemes have been proposed assuming the existence...
Although Radio Frequency IDentification (RFID) systems offer many remarkable characteristics, security and privacy concerns are not easy to address. In this paper, we aim to overcome some of the significant privacy and security concerns by proposing a simple and lightweight RFID mutual authentication protocol. Our protocol is utilising hash functions and simple bitwise operations in an attempt to...
Security is highly challenging in today's world. A country may face lot of problems due to security such as military applications, vehicle theft. Radio Frequency Identification (RFID) is the next technology to improve the security. RFID technology is applied in national defense, Medical, Human Identification, for tracking stable and moving objects. A small RFID Tag and the Reader have Contribute their...
The increasing demand to deploy efficient ways of identification has made Radio frequency Identification (RFID) technology ubiquitous. Due to the wireless nature of communication between the reader and the tag, this technology imposes major security and privacy threats. Massive work to design a powerful authentication protocol has been put to overcome various threats against privacy and security of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.