The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the increasing popularity of RFID applications, RFID protocols are widely discussed. Most RFID protocols use a central database to store the RFID tag data, while severless RFID protocols are proposed to provide users with security and privacy protection without the connection and security problem between readers and sever. The shortcoming of severless RFID protocols is that the reader is authorized...
For RFID mutual authentication security protocols which need back-end server have poor mobile performance, it cannot be applied to environments which have poor wireless network. The RFID mutual authentication security protocol based on key dispersion algorithm is designed in this paper, which proposes a new method for managing and distributing keys for a large number of tags. This protocol which does...
Radio Frequency IDentification (RFID) is a leading ubiquitous computing technology for the future. However, the rapid deployment of low-cost RFID tags in large scale raises significant personal privacy threats. Low-cost tags are extremely resource-constrained devices. Hence it is easy to corrupt a low-cost RFID tag to obtain useful information, trace its history and discover its identity. Therefore...
Since the current RFID systems have potential security problems in privacy, an improved method based on the random Hash lock is proposed following the analysis of several typical RFID methods. It can effectively prevent location tracking, eavesdropping, replaying and so on. In addition, it has many other advantages, such as s low computation complexity, low label cost and high security.
RFID (Radio Frequency Identification) system brings us many advantages, but the security and privacy problems are the impediment to the increasing using of it, particularly to the low-cost one. In order to solve this problem economically, we manage to design a new scheme for low-cost passive RFID tags based on the cryptographic techniques. Considering the ID should be regarded as a secret when facing...
Due to rapid advance of the RFID systems, there is sufficient computing power to implement the encryption and decryption required for the authentication during transactions nowadays. In addition, RFID tags have enough capacity to store the corresponding information. Therefore, RFID enabled credit card can be used to improve the potential security issues occurred while using the traditional credit...
In 2007, Chen et al. proposed a RFID authentication protocol for anti-counterfeiting and privacy protection. A feasible security mechanism for anti-counterfeiting and privacy protection was proposed using XOR and random number shifting operations to enhance RFID tags security providing a low cost. However, their authentication protocol has some drawbacks and security problems because they did not...
In this work we propose a mutual authentication protocol for RFID (Radio Frequency Identification) systems incorporating low-cost RFID tags. These tags, due to their limited computational capabilities do not incorporate advanced cryptographic primitives. As a result, there are various threats against userspsila privacy and against the security of such systems. Our protocol, PMM, utilizes a hash function...
Since tags have very limited memory and very low computational capacity a so-called lightweight authentication is needed. The earlier suggested algorithms do not satisfy all of the security requirements. In this paper we introduce our SLAP protocol which meets all the security requirements. Our solution provides an efficient mutual authentication method by which a given tag and the back-end can authenticate...
Recently the concern about security and privacy issues of RFID tags have emerged just because of the vital information in the operation of the RFID system at open radio frequency circumstance. To overcome these threats, this paper presents a mutual authentication mechanism, renewing the tag's key value in each process, which can solve the problem such as privacy or wiretapping, replay attack, forward...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.