289 Hits in 3.6 sec

When Compromised Readers Meet RFID [chapter]

Gildas Avoine, Cédric Lauradoux, Tania Martin
2009 Lecture Notes in Computer Science  
RFID-based access control solutions for mobile environments, e.g. ticketing systems for sport events, commonly rely on readers that are not continuously connected to the back-end system.  ...  We then design a sporadically-online solution that meets our expectations in terms of both security and privacy.  ...  Solving the Privacy Issue In a system with mobile readers, it is more attractive for an adversary to compromise a reader than a tag.  ... 
doi:10.1007/978-3-642-10838-9_4 fatcat:c4k3ksapfjbxzah56ljgmx2ebq

An NFC based consumer-level counterfeit detection framework

Muhammad Qasim Saeed, Zeeshan Bilal, Colin D. Walter
2013 2013 Eleventh Annual Conference on Privacy, Security and Trust  
However, there is still a rising trend in counterfeit goods. With the emergence of RFID systems, supply chain management is able to detect counterfeit products relatively easily.  ...  Our solution is completely offline as it does not require a central database for product authentication. It is based on Public Key Cryptography (PKC) and a Public Key Infrastructure (PKI).  ...  This is a semi-offline model as it requires an initial key distribution mechanism to distribute keys to readers through some secure channel.  ... 
doi:10.1109/pst.2013.6596047 dblp:conf/pst/SaeedBW13 fatcat:njyvd4it4veafavaefqy2qmg4y

A Comparison Survey Study on RFID Based Anti-Counterfeiting Systems

Ghaith Khalil, Robin Doss, Morshed Chowdhury
2019 Journal of Sensor and Actuator Networks  
As this issue evolved in industry, there were several techniques used to address the problem; each technique uses a different concept and mechanism in resolving the issue.  ...  In this article, we present a survey study on the research topic of anti-counterfeiting products using RFID tags on merchandise.  ...  Conflicts of Interest: We are the authors of "A Comparison Survey Study on RFID tag Anti-Counterfeiting Systems" we declare that there is no conflict of interest.  ... 
doi:10.3390/jsan8030037 fatcat:i3ayy7oosndebmjyl5cdgo6abi

Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags

Tassos Dimitriou
2016 Ad hoc networks  
We do this by developing and formalizing the notion of a keyevolving RFID system.  ...  In this work we make an important step in providing for RFID privacy by letting users control all the tags they possess.  ...  Figure 2 : 2 Basic privacy experiment for the RFID system S = (Keys, R, {T i }). Figure 3 : 3 Forward privacy experiment for the RFID system F S = (Keys, Update, R, {T i }).  ... 
doi:10.1016/j.adhoc.2015.08.019 fatcat:nv46kqrjbbd3pjo4vrwmqsptwq

Privacy for Public Transportation [chapter]

Thomas S. Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, Kevin Fu
2006 Lecture Notes in Computer Science  
We demonstrate security and privacy features offered by our hybrid system that are unavailable in a homogeneous passive transponder architecture, and which are advantageous for users of passive as well  ...  We discuss some of the interesting features of transit ticketing as a problem domain, and provide an architecture sufficient for the needs of a typical metropolitan transit system.  ...  Acknowledgments We are grateful to Anna Lysyanskaya for discussions about cloning detection for anonymous credentials systems, and to Ben Adida and Susan Hohenberger for discussion about the feasibility  ... 
doi:10.1007/11957454_1 fatcat:vxqlocianfewfleqos2w4hrumy

Secured RFID Mutual Authentication Scheme for Mifare Systems

Kuo Tsang Huang
2012 International journal of network security and its applications  
We proposed a scheme to improve the mechanisms for authentication, no additional secret parameters into the standard, solely by readers and tags communication between the timing of the change of use of  ...  Our proposed authentication protocol can be used to solve the secret key recovery security problems of RFID systems.  ...  Identity and authentication mechanisms are key technologies in many of the security and privacy RFID applications. Most RFID devices achieve the key distribution through authentication mechanisms.  ... 
doi:10.5121/ijnsa.2012.4602 fatcat:umtz7znp75cj7d2cyvjaxdzr6e

Real-time location and inpatient care systems based on passive RFID

Pablo Najera, Javier Lopez, Rodrigo Roman
2011 Journal of Network and Computer Applications  
Lab testing of system reliability based on passive UHF RFID is provided for this case.  ...  On the other hand, we analyze and provide a solution for care and control of patients in a hospital based on passive HF RFID with the result of a fully functional demonstrator.  ...  Data privacy: information stored on RFID cards is encrypted so it is unavailable to third parties.  ... 
doi:10.1016/j.jnca.2010.04.011 pmid:34170999 pmcid:PMC7148963 fatcat:2z7e4zooinavhpdz37se4herjy

A Comprehensive Survey on Security and Privacy for Electronic Health Data

Se-Ra Oh, Young-Duk Seo, Euijong Lee, Young-Gab Kim
2021 International Journal of Environmental Research and Public Health  
Then, we reviewed recent security and privacy studies that focus on each component of the e-health systems.  ...  In particular, edge and fog computing studies for e-health security and privacy were reviewed since the studies had mostly not been analyzed in other survey papers.  ...  [85] proposed a privacy-preserving framework named PriSens-HSAC for RFID to support a group based anonymous authentication protocol.  ... 
doi:10.3390/ijerph18189668 pmid:34574593 fatcat:nx7rjvy7tfczjbgmmpqgyiajuu

Ubiquitous computing in the real world: lessons learnt from large scale RFID deployments

Shin'ichi Konomi, George Roussos
2006 Personal and Ubiquitous Computing  
development so as to better identify successful aspects, regard for the economics of systems as a core requirement, and selection of open or closed systems are all issues that are mostly outside the scope  ...  of current ubiquitous computing research but play a critical role in industrial deployments.  ...  that provided a wealth of information.  ... 
doi:10.1007/s00779-006-0116-1 fatcat:yysmiazh5jdvxbe76dijitn7ge

A Framework for Developing Social Networks Enabling Systems to Enhance the Transparency and Visibility of Cross-border Food Supply Chains

Frank J. Xu, Victor P. Zhao, Lu Shan, Chuxiong Huang
2014 GSTF International Journal on Computing  
In this paper a framework is proposed for developing social networks enabling food traceability systems, which not only leverages enterprise Manuscript applications, public service platforms for food quality  ...  Guidelines, architectures, use scenarios, and technology alternatives for implementing the traceability systems are also discussed in this work.  ...  for attracting prospects to its website and offline stores.  ... 
doi:10.7603/s40601-013-0051-8 fatcat:ik35vix65fbzfghkfbiafgvhmq

ReSC: RFID-Enabled Supply Chain Management and Traceability for Network Devices [chapter]

Kun Yang, Domenic Forte, Mark Tehranipoor
2015 Lecture Notes in Computer Science  
One promising approach is based on Radio-Frequency Identification (RFID) where each product is equipped with a unique RFID tag that can be read in a contactless fashion to track the movement of products  ...  Simulations and experimental results based on a printed circuit board (PCB) prototype demonstrate the effectiveness of ReSC.  ...  We can restore the compromised tag trace by retrieving backup from the database when the reader is connected to the network. Protecting tag privacy [4] is out of the scope of this paper.  ... 
doi:10.1007/978-3-319-24837-0_3 fatcat:c3dmv5nwsbb57d7r557t63jhya

Peripheral state persistence for transiently-powered systems

Gautier Berthou, Tristan Delizy, Kevin Marquet, Tanguy Risset, Guillaume Salagnac
2017 2017 Global Internet of Things Summit (GIoTS)  
Several systems share CCCP's goal of exploiting properties of RFID systems to enhance security and privacy.  ...  Effective mechanisms for security and privacy should not provide new avenues for an unauthorized person to drain a device's battery.  ... 
doi:10.1109/giots.2017.8016243 dblp:conf/giots/BerthouDMRS17 fatcat:r2vbvtjlnvdlxkkt6ldrw43l6m

A Privacy-Preserving E-Ticketing System for Public Transportation Supporting Fine-Granular Billing and Local Validation

Ivan Gudymenko
2014 Proceedings of the 7th International Conference on Security of Information and Networks - SIN '14  
This paper focuses on this issue and presents a framework for constructing privacy-preserving e-ticketing systems for public transportation.  ...  What differentiates our solution from other research contributions and real-world systems is that while being inherently privacy-preserving it (1) provides support for fine-granular billing (for registered  ...  Certain privacy-preserving solutions with regular billing support consider specific tariff schemes tailored to the mechanisms for privacy protection employed in the system, see [13] , for example.  ... 
doi:10.1145/2659651.2659706 dblp:conf/sin/Gudymenko14 fatcat:5gpca547bzb27assj6qb2jnrym

Big Data in Internet of Things: Architecture and Open Research Challenges

Iram Haider, Muhammad Arslan Haider, Arshad Saeed
2020 2020 IEEE 23rd International Multitopic Conference (INMIC)  
Furthermore, data analytic methods and technologies for mining these big data are discussed.  ...  However, the solutions are still in their embryonic stage and this field lacks a comprehensive study and surveys.  ...  As a result, the image is blurry. Although the design of the e-plate system [20] using RFID provides a good resolution for management and monitoring, identification of vehicles, and tracking.  ... 
doi:10.1109/inmic50486.2020.9318203 fatcat:c6ynlz62svf6pj7eaczcej2n7a

A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures and Challenges

Abeer Iftikhar Tahirkheli, Muhammad Shiraz, Bashir Hayat, Muhammad Idrees, Ahthasham Sajid, Rahat Ullah, Nasir Ayub, Ki-Il Kim
2021 Electronics  
In this survey, we provide a comprehensive security analysis of CC-enabled IoT and present state-of-the-art in the research area.  ...  Cloud Computing (CC) is a promising technology due to its pervasive features, such as online storage, high scalability, and seamless accessibility, in that it plays an important role in reduction of the  ...  Prerequisites to the distribution of data are user awareness and consent. (4) Security and Privacy protection in RFID: Privacy protection in the RFID systems requires both physical and cryptographic mechanisms  ... 
doi:10.3390/electronics10151811 fatcat:nqkyuoti5nd2pl5lo3hwcmu3xe
« Previous Showing results 1 — 15 out of 289 results