The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This work investigates the anonymous tag cardinality estimation problem in radio frequency identification systems with frame slotted aloha-based protocol. Each tag, instead of sending its identity upon receiving the reader's request, randomly responds by only one bit in one of the time slots of the frame due to privacy and security. As a result, each slot with no response is observed as in an empty...
Due to massive advantages of short range communication technologies such as NFC and RFID, they are ubiquitously utilized in many fancy and sensitive applications. During last decade, there have been impressive endeavors to design efficient authentication protocols which can provide secure and anonymous communication for end-users. In this research, we formally analyze a recently improved authentication...
Radio frequency identification is a modern technology for item identification that has widely spread over the recent years. In order to securely identify the items and transfer their ownership from one entity to another, several authentication and ownership management protocols have been proposed. One of the recent protocols is Niu et al.'s EPC Class 1 Generation 2 RFID Standard Authentication and...
Nowadays, passive Ultra High Frequency (UHF) Radio Frequency IDentification (RFID) is used ubiquitously in supply-chain management, logistics, and industrial environments. Both, the tags identifier and user memory may contain sensitive information, raising privacy concerns if read without authorization. To address this issue, security related amendments to the conventional standards have been made...
One of the popular concepts nowadays is the Internet of Things (IoT). IoT will convert our daily life objects into smart objects. In order to become a part of the IoT network, these smart devices will require some technologies and protocols. In this paper, we will study the different te chnologies that enable the smart objects to be come a part of the IoT network. Furthermore, we will have a look...
Radio frequency identification (RFID) is one of the key technologies of Internet of Things, which have many security issues in an open environment. In order to solve the communication problem between RFID tags and readers, security protocols has been improved constantly as the first choice. But the form of attack is also changing constantly with the development of technology. In this paper we classify...
We set up a framework for the formal proofs of RFID protocols in the computational model. We rely on the so-called computationally complete symbolic attacker model. Our contributions are: 1) to design (and prove sound) axioms reflecting the properties of hash functions (Collision-Resistance, PRF). 2) to formalize computational unlinkability in the model. 3) to illustrate the method, providing the...
Internet of things(IoT) is the system which interrelates different computational devices, digital machines, mechanical machines and they have been bestowed with unique identifier having the talent to send data over a interconnection of networks which does not require interactions between human and human or machine and mankind. In this manuscript we have discussed about the different communication...
In this paper, we focus on the problem of collision in tags identification in RFID systems. We propose tree algorithm with single error bit tracking that utilizes Manchester coding to know the position of collision bit among the ID of the tags. The reader broadcasts the Query bit that is updated in every collision. The update is done according to the position of the collision bit that allows to reduce...
Security for accessing an area need to be noticed. Access restriction can be applied using authentication such as password. Thereby, the strong password is required, but it is hard to remember. Strong password can be generated by using hash function and stored on smart card can be solution. Smart card can be used as access card. Nevertheless, vulnerabilities of the card need to be noticed. Lamport's...
In this paper, a mutual authentication protocol based on ECC is designed for RFID systems. This protocol is described in detail and the performance of this protocol is analyzed. The results show that the protocol has many advantages, such as mutual authentication, confidentiality, anonymity, availability, forward security, scalability and so on, which can resist camouflage attacks, tracking attacks,...
Radio Frequency Identification (RFID) makes it a supporting technology for the Internet of things (IoT). While RFID has been widely used and developed rapidly, its security and privacy issues cannot be ignored. With the development of cloud computing, cloud based RFID system has become a new solution. Protecting the security of RFID system in cloud environment is particularly important. Not verifying...
In the era of the Internet of Things (IoT), data from sensors can give insightful enterprise information through analytics. As a result, several enterprises are adopting sensors and other wireless technologies for their needs. However, some challenges exist within the IoT space. Most of the devices in use have varied device semantics and protocol variations which can limit interoperability. As a result,...
RFID systems have been widely deployed for various applications such as supply chain management, indoor localization, inventory control, and access control. This paper deals with the fundamental problem of estimating the number of arriving and departing tags between any two time instants in dynamically changing RFID tag populations, which is needed in many applications such as warehouse monitoring...
Ever-increasing research effort has been dedicated to multi-group radio frequency identification (RFID) systems where all tags are partitioned into multiple groups, such as group-level queries, and multi-group missing tag detection. However, it is assumed in the existing work that all tags know their individual group IDs, which thus leaves group labeling problem unaddressed. To tackle the under-investigated...
Radio Frequency Identification (RFID) technology brings a revolutionary change in warehouse management by automatically monitoring and tracking products. The grouping problem is to efficiently inform all tags which groups they belong to, such that tags in the same group have the same group ID. With this information, the reader can transmit data through efficient multicast rather than tedious unicast...
In RFID-enabled applications, when a tag is put into use and associated with a specific object, the category-related information (e.g., the brands of clothes) about this object might be preloaded into the tag's memory as required. Since such information reflects the category attributes, all tags in the same category carry the identical category information. To collect this information, we do not need...
In RFID systems, the privacy problem has attracted increasing attention as the tags have extremely limited on-chip resources and may blindly respond to unauthorized readers. To protect the privacy, one widely used solution is to deploy one or more blocker tags to collide the RF signal sent from protected tags all the time. In this paper, we investigate the problem of tag identification in privacy-sensitive...
RFID technologies are making their way into numerous applications, including inventory management, supply chain, product tracking, transportation, logistics, etc. One important application is to automatically detect anomalies in RFID systems, such as missing tags, unknown tags, or cloned tags due to theft, management error, or targeted attacks. Existing solutions are all designed to detect a certain...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.