161 Hits in 4.3 sec

Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags [chapter]

Tobias Lohmann, Matthias Schneider, Christoph Ruland
2006 Lecture Notes in Computer Science  
The gate-equivalents of several cryptographic operations are then compared with the available energy and a conclusion is drawn if they are feasible for RFID tags.  ...  This paper shows that the security gap between low-cost RFID Tags that only provide simple security features and contactless smartcards can be filled.  ...  Those implementations are available in IP (Intellectual Property) -cores which are ready made models, Analysis of RFID Cryptography In order to determine if and which type of cryptographic algorithm  ... 
doi:10.1007/11733447_20 fatcat:iidisdmwfzewtifzotzfmuhwqi

On the security of RFID devices against implementation attacks

Michael Hutter, Thomas Plos, Martin Feldhofer
2010 International Journal of Security and Networks (IJSN)  
With the possibility to fabricate low-cost RFID tags in high volume, RFID technology has become  ...  His main research topic is the low-power hardware implementation of cryptographic modules. Currently, he is working on the implementation of DPA-secure symmetric and asymmetric crypto algorithms.  ...  Acknowledgements The authors would like to thank Jörn-Marc Schmidt for his active collaboration in this work.  ... 
doi:10.1504/ijsn.2010.032209 fatcat:wrr52g3ywnfjfdeheslrjl6nfm

RFID Systems and Security and Privacy Implications [chapter]

Sanjay E. Sarma, Stephen A. Weis, Daniel W. Engels
2003 Lecture Notes in Computer Science  
The commercial availability of low-cost, Auto-ID Center standards-based RFID systems by mid-2003 has poised these systems to be one of the earliest and perhaps most explosive opportunities in ubiquitous  ...  Low-cost transponders enable the tagging and unique identification of virtually all man-made items.  ...  The authors wish to thank Ron Rivest and Peter Cole for their continued support of this work.  ... 
doi:10.1007/3-540-36400-5_33 fatcat:7gay747ut5h4pmq4vl6ccibm6y

An Energy-Efficient ECC Processor of UHF RFID Tag for Banknote Anti-Counterfeiting

Xi Tan, Mianxiong Dong, Cheng Wu, Kaoru Ota, Junyu Wang, Daniel W. Engels
2017 IEEE Access  
In this paper, we present the design and analysis of an energy-efficient 163-b elliptic curve cryptographic (ECC) processor suitable for passive ultrahigh frequency (UHF) radio frequency identification  ...  This size, speed, and power of the ECC processor makes it practical to use within a passive UHF RFID tag and achieve up to 1500 banknote authentications per minute, which is sufficient for use in the fastest  ...  His research interests include RFID reader and tag design, RFID anti-collision algorithm, RFID security, RFID sensor tag, and Internet of Things for food drug safety. DANIEL W.  ... 
doi:10.1109/access.2016.2615003 fatcat:ouei4q3i4vbxvhszgktdhrtice

Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices [chapter]

Marcel Medwed, François-Xavier Standaert, Johann Großschädl, Francesco Regazzoni
2010 Lecture Notes in Computer Science  
The main obstacles towards secure RFID are the extreme constraints of passive tags in terms of power consumption and silicon area, which makes the integration of countermeasures against physical attacks  ...  In this context, RFID tags need to be protected against physical attacks such as Differential Power Analysis (DPA) and fault attacks.  ...  François-Xavier Standaert is a Research Associate of the Belgian Fund for Scientific Research (FNRS -F.R.S.).  ... 
doi:10.1007/978-3-642-12678-9_17 fatcat:ch6ds4mhkjevvmip7dqmfghfem

A Survey of RFID Data Processing [chapter]

Charu C. Aggarwal, Jiawei Han
2012 Managing and Mining Sensor Data  
Such tags are very useful in inventory management and logistics, because they can be used in order to track the movement and locations of large volumes of items in a cost effective way.  ...  The use of RFID also has a number of privacy challenges associated with it, because a tag on an item being carried by a person, also becomes a unique location tag for that person.  ...  RFID data brings numerous challenges with it for the purposes of mining and analysis.  ... 
doi:10.1007/978-1-4614-6309-2_11 fatcat:ai7v7e3pk5auxm465algzwlfrq

Secure Operation, Control, and Maintenance of Future E-Enabled Airplanes

K. Sampigethaya, R. Poovendran, L. Bushnell
2008 Proceedings of the IEEE  
Commercial aviation is at the threshold of the era of the e-enabled airplane, brought about by the convergence of rapidly expanding world-wide data communication infrastructures, network-centric information  ...  This paper presents a comprehensive survey of security of the e-enabled airplane with applications such as electronic distribution of loadable software and data, as well as future directions such as wireless  ...  Lintelman and Chuck Royalty from The Boeing Company, and David von Oheimb from Siemens Corporation for collaborating on the electronic distribution of loadable software.  ... 
doi:10.1109/jproc.2008.2006123 fatcat:dt4gkqm3z5h7tb7bttmucvqc4e

Energy Harvesting Techniques for Wireless Sensor Networks/Radio-Frequency Identification: A Review

Mohammed H. Alsharif, Sunghwan Kim, Nuri Kuruoğlu
2019 Symmetry  
Therefore, the importance of EE in IoT technology cannot be overemphasised, specifically the development of EE solutions for sustainable IoT technology.  ...  In the near future, symmetry technologies for the Internet of Things (IoT), along with symmetry and asymmetry applications for IoT security and privacy, will re-design the socio-ecological human terrain  ...  Doing so is a challenge from an energy consumption perspective, because cryptographic algorithms require a large amount of energy and battery (active tag).  ... 
doi:10.3390/sym11070865 fatcat:hv4obplnszdxtnuzci4bt24fhu

A Holistic Approach for Security Requirement Specification for Low-Cost, Distributed Ubiquitous Systems

Yanjun Zuo
2010 International Conference on Information Systems  
This paper presents a holistic approach for security requirement analysis for low cost, distributed ubiquitous systems.  ...  The unique features of such a class of ubiquitous systems make the security analysis different from that for the centralized computing paradigms.  ...  Acknowledgement This work was supported in part by US AFOSR under grant FA 9550-09-1-0215. The author is thankful to Dr. Robert Herklotz for his support, which made this work possible.  ... 
dblp:conf/icis/Zuo10 fatcat:c6qupucncfeqpkzwyfml5bgoy4

The Role of RFID in Green IoT: A Survey on Technologies, Challenges and a Way Forward

Zainatul Yushaniza Mohamed Yusoff, Mohamad Khairi Ishak, Kamal Ali Alezabi
2021 Advances in Science, Technology and Engineering Systems  
If the predictions are also correct, energy use issues arise as active battery-powered RFID detection needs to be addressed by incorporating new solutions for Green IoT technology.  ...  The use of resources in this area presents new challenges for this technology. The goal was to find a green IoT that focuses on energy efficiency and IoT efficiency.  ...  Acknowledgment The authors would like to thank Majlis Amanah Rakyat (MARA) and Universiti Sains Malaysia, for providing the financial support under Research Grant RUI(1001/PELECT/8014049) to carry out  ... 
doi:10.25046/aj060103 fatcat:plofdecp6zespcblkqe7a567vi

On physical-layer identification of wireless devices

Boris Danev, Davide Zanetti, Srdjan Capkun
2012 ACM Computing Surveys  
This work systematizes the existing knowledge on this topic in order to enable a better understanding of device identification, its implications on the analysis and design of security solutions in wireless  ...  We further present a classification of attacks and discuss the feasibility, limitations, and implications in selected applications.  ...  In the past years, several works have been proposed [7, 16, 45, 54, 61] , but due to the limited resources and cost constraints of RFID tag for supply chain applications, a standardizable anti-cloning  ... 
doi:10.1145/2379776.2379782 fatcat:boyvan25o5fnznvwu5j2ng6uxy

Internet of things: Survey on security

Diego Mendez Mena, Ioannis Papapanagiotou, Baijian Yang
2018 Information Security Journal  
In this paper,we aim to provide a thorough survey related to the privacy and security challenges of the IoT.  ...  The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities or "things".  ...  Back in 2004 and 2005, proof-of-concept attacks have been published against RFID financial transactions disclosures as well as cryptographic keys brute-forcing for widely deployed RFID tags [29] .  ... 
doi:10.1080/19393555.2018.1458258 fatcat:4323ta6rlrd7tfruisq6ryjone

The Internet of Things: A Survey from the Data-Centric Perspective [chapter]

Charu C. Aggarwal, Naveen Ashish, Amit Sheth
2012 Managing and Mining Sensor Data  
Even in cases, where the data is stored offline, the size of the data is often so large and distributed, that it requires the use of big data analytical tools for processing.  ...  Advances in sensor data collection technology, such as pervasive and embedded devices, and RFID Technology have lead to a large number of smart devices which are connected to the net and continuously transmit  ...  For RFID data, this is a greater challenge because the password-protection process requires the use of energy-intensive cryptographic algorithms.  ... 
doi:10.1007/978-1-4614-6309-2_12 fatcat:rgrbqjfllzb2tkgnixdrzfvdfy

Security of Wireless Communication [chapter]

Dan Cvrček
2009 IFIP Advances in Information and Communication Technology  
The second part of the paper details particular attacks that work against current implementations of wireless sensor networks and routing, traffic analysis, and cryptography in particular.  ...  It seems that monitoring of large civil engineering structures is one of the few applications where wireless sensor networks may give enough value for the necessary investment.  ...  for powerful low cost attacks.  ... 
doi:10.1007/978-3-642-03315-5_9 fatcat:26fntrqq5bfqjjugauogi4rf3q

Applications of Mobile Agents in Wireless Networks and Mobile Computing [chapter]

Sergio González-Valenzuela, Min Chen, Victor C.M. Leung
2011 Advances in Computers  
In particular, factors such as context awareness and user mobility are now crucial in the design of communications protocols used by portable devices with moderate to severe bandwidth and battery power  ...  We examine the applicability of mobile software codes to perform networking tasks in wireless and mobile computing environments.  ...  power processing constraints, as seen in contemporary WSNs.  ... 
doi:10.1016/b978-0-12-385512-1.00004-9 fatcat:x2rlcels5neu3lsnnayd57haga
« Previous Showing results 1 — 15 out of 161 results