A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags
[chapter]
2006
Lecture Notes in Computer Science
The gate-equivalents of several cryptographic operations are then compared with the available energy and a conclusion is drawn if they are feasible for RFID tags. ...
This paper shows that the security gap between low-cost RFID Tags that only provide simple security features and contactless smartcards can be filled. ...
Those implementations are available in IP (Intellectual Property) -cores which are ready made models,
Analysis of RFID Cryptography In order to determine if and which type of cryptographic algorithm ...
doi:10.1007/11733447_20
fatcat:iidisdmwfzewtifzotzfmuhwqi
On the security of RFID devices against implementation attacks
2010
International Journal of Security and Networks (IJSN)
With the possibility to fabricate low-cost RFID tags in high volume, RFID technology has become ...
His main research topic is the low-power hardware implementation of cryptographic modules. Currently, he is working on the implementation of DPA-secure symmetric and asymmetric crypto algorithms. ...
Acknowledgements The authors would like to thank Jörn-Marc Schmidt for his active collaboration in this work. ...
doi:10.1504/ijsn.2010.032209
fatcat:wrr52g3ywnfjfdeheslrjl6nfm
RFID Systems and Security and Privacy Implications
[chapter]
2003
Lecture Notes in Computer Science
The commercial availability of low-cost, Auto-ID Center standards-based RFID systems by mid-2003 has poised these systems to be one of the earliest and perhaps most explosive opportunities in ubiquitous ...
Low-cost transponders enable the tagging and unique identification of virtually all man-made items. ...
The authors wish to thank Ron Rivest and Peter Cole for their continued support of this work. ...
doi:10.1007/3-540-36400-5_33
fatcat:7gay747ut5h4pmq4vl6ccibm6y
An Energy-Efficient ECC Processor of UHF RFID Tag for Banknote Anti-Counterfeiting
2017
IEEE Access
In this paper, we present the design and analysis of an energy-efficient 163-b elliptic curve cryptographic (ECC) processor suitable for passive ultrahigh frequency (UHF) radio frequency identification ...
This size, speed, and power of the ECC processor makes it practical to use within a passive UHF RFID tag and achieve up to 1500 banknote authentications per minute, which is sufficient for use in the fastest ...
His research interests include RFID reader and tag design, RFID anti-collision algorithm, RFID security, RFID sensor tag, and Internet of Things for food drug safety. DANIEL W. ...
doi:10.1109/access.2016.2615003
fatcat:ouei4q3i4vbxvhszgktdhrtice
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
[chapter]
2010
Lecture Notes in Computer Science
The main obstacles towards secure RFID are the extreme constraints of passive tags in terms of power consumption and silicon area, which makes the integration of countermeasures against physical attacks ...
In this context, RFID tags need to be protected against physical attacks such as Differential Power Analysis (DPA) and fault attacks. ...
François-Xavier Standaert is a Research Associate of the Belgian Fund for Scientific Research (FNRS -F.R.S.). ...
doi:10.1007/978-3-642-12678-9_17
fatcat:ch6ds4mhkjevvmip7dqmfghfem
A Survey of RFID Data Processing
[chapter]
2012
Managing and Mining Sensor Data
Such tags are very useful in inventory management and logistics, because they can be used in order to track the movement and locations of large volumes of items in a cost effective way. ...
The use of RFID also has a number of privacy challenges associated with it, because a tag on an item being carried by a person, also becomes a unique location tag for that person. ...
RFID data brings numerous challenges with it for the purposes of mining and analysis. ...
doi:10.1007/978-1-4614-6309-2_11
fatcat:ai7v7e3pk5auxm465algzwlfrq
Secure Operation, Control, and Maintenance of Future E-Enabled Airplanes
2008
Proceedings of the IEEE
Commercial aviation is at the threshold of the era of the e-enabled airplane, brought about by the convergence of rapidly expanding world-wide data communication infrastructures, network-centric information ...
This paper presents a comprehensive survey of security of the e-enabled airplane with applications such as electronic distribution of loadable software and data, as well as future directions such as wireless ...
Lintelman and Chuck Royalty from The Boeing Company, and David von Oheimb from Siemens Corporation for collaborating on the electronic distribution of loadable software. ...
doi:10.1109/jproc.2008.2006123
fatcat:dt4gkqm3z5h7tb7bttmucvqc4e
Energy Harvesting Techniques for Wireless Sensor Networks/Radio-Frequency Identification: A Review
2019
Symmetry
Therefore, the importance of EE in IoT technology cannot be overemphasised, specifically the development of EE solutions for sustainable IoT technology. ...
In the near future, symmetry technologies for the Internet of Things (IoT), along with symmetry and asymmetry applications for IoT security and privacy, will re-design the socio-ecological human terrain ...
Doing so is a challenge from an energy consumption perspective, because cryptographic algorithms require a large amount of energy and battery (active tag). ...
doi:10.3390/sym11070865
fatcat:hv4obplnszdxtnuzci4bt24fhu
A Holistic Approach for Security Requirement Specification for Low-Cost, Distributed Ubiquitous Systems
2010
International Conference on Information Systems
This paper presents a holistic approach for security requirement analysis for low cost, distributed ubiquitous systems. ...
The unique features of such a class of ubiquitous systems make the security analysis different from that for the centralized computing paradigms. ...
Acknowledgement This work was supported in part by US AFOSR under grant FA 9550-09-1-0215. The author is thankful to Dr. Robert Herklotz for his support, which made this work possible. ...
dblp:conf/icis/Zuo10
fatcat:c6qupucncfeqpkzwyfml5bgoy4
The Role of RFID in Green IoT: A Survey on Technologies, Challenges and a Way Forward
2021
Advances in Science, Technology and Engineering Systems
If the predictions are also correct, energy use issues arise as active battery-powered RFID detection needs to be addressed by incorporating new solutions for Green IoT technology. ...
The use of resources in this area presents new challenges for this technology. The goal was to find a green IoT that focuses on energy efficiency and IoT efficiency. ...
Acknowledgment The authors would like to thank Majlis Amanah Rakyat (MARA) and Universiti Sains Malaysia, for providing the financial support under Research Grant RUI(1001/PELECT/8014049) to carry out ...
doi:10.25046/aj060103
fatcat:plofdecp6zespcblkqe7a567vi
On physical-layer identification of wireless devices
2012
ACM Computing Surveys
This work systematizes the existing knowledge on this topic in order to enable a better understanding of device identification, its implications on the analysis and design of security solutions in wireless ...
We further present a classification of attacks and discuss the feasibility, limitations, and implications in selected applications. ...
In the past years, several works have been proposed [7, 16, 45, 54, 61] , but due to the limited resources and cost constraints of RFID tag for supply chain applications, a standardizable anti-cloning ...
doi:10.1145/2379776.2379782
fatcat:boyvan25o5fnznvwu5j2ng6uxy
Internet of things: Survey on security
2018
Information Security Journal
In this paper,we aim to provide a thorough survey related to the privacy and security challenges of the IoT. ...
The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities or "things". ...
Back in 2004 and 2005, proof-of-concept attacks have been published against RFID financial transactions disclosures as well as cryptographic keys brute-forcing for widely deployed RFID tags [29] . ...
doi:10.1080/19393555.2018.1458258
fatcat:4323ta6rlrd7tfruisq6ryjone
The Internet of Things: A Survey from the Data-Centric Perspective
[chapter]
2012
Managing and Mining Sensor Data
Even in cases, where the data is stored offline, the size of the data is often so large and distributed, that it requires the use of big data analytical tools for processing. ...
Advances in sensor data collection technology, such as pervasive and embedded devices, and RFID Technology have lead to a large number of smart devices which are connected to the net and continuously transmit ...
For RFID data, this is a greater challenge because the password-protection process requires the use of energy-intensive cryptographic algorithms. ...
doi:10.1007/978-1-4614-6309-2_12
fatcat:rgrbqjfllzb2tkgnixdrzfvdfy
Security of Wireless Communication
[chapter]
2009
IFIP Advances in Information and Communication Technology
The second part of the paper details particular attacks that work against current implementations of wireless sensor networks and routing, traffic analysis, and cryptography in particular. ...
It seems that monitoring of large civil engineering structures is one of the few applications where wireless sensor networks may give enough value for the necessary investment. ...
for powerful low cost attacks. ...
doi:10.1007/978-3-642-03315-5_9
fatcat:26fntrqq5bfqjjugauogi4rf3q
Applications of Mobile Agents in Wireless Networks and Mobile Computing
[chapter]
2011
Advances in Computers
In particular, factors such as context awareness and user mobility are now crucial in the design of communications protocols used by portable devices with moderate to severe bandwidth and battery power ...
We examine the applicability of mobile software codes to perform networking tasks in wireless and mobile computing environments. ...
power processing constraints, as seen in contemporary WSNs. ...
doi:10.1016/b978-0-12-385512-1.00004-9
fatcat:x2rlcels5neu3lsnnayd57haga
« Previous
Showing results 1 — 15 out of 161 results