A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
RFID Middleware Design and Architecture
[chapter]
2011
Designing and Deploying RFID Applications
This tag provides the security features of a Read-Only tag while adding the additional functionality of Read-Write tags. RFID tags operation frequencies RFID tags operate in several frequency bands. ...
Unlike the other systems, line of sight is required for the communication between RFID reader and tags. ...
A layer of the RFID middleware incorporates all the device drivers of different hardware and exposes to the application standard interfaces to access this hardware. ...
doi:10.5772/16917
fatcat:nwb72pussvbibm5nql4sydeozu
GenePrint: Generic and Accurate Physical-Layer Identification for UHF RFID Tags
2016
IEEE/ACM Transactions on Networking
GenePrint leverages the internal similarity among pulses of tags' RN16 preamble signals to extract a hardware feature as the fingerprint. ...
In this paper, we propose a novel physical-layer identification system, GenePrint, for UHF passive tags. ...
We are also trying to design a general physical-layer identification solution for a variety of wireless devices.
IX. ACKNOWLEDGEMENTS ...
doi:10.1109/tnet.2015.2391300
fatcat:37up3ar7mzdczmw2fcolxdxfba
SLIM: A Lightweight Block Cipher for Internet of Health Things
2020
IEEE Access
With simple operations on the RFID tag, it will be enabled to defend against different types of attacks, which make it very attractive to low-cost RFIDs. ...
The proposed algorithm has an excellent performance in both hardware and software environments, with a limited implementation area of only 553 GE, an acceptable cost/security for RFID systems, and an energy-efficient ...
doi:10.1109/access.2020.3036589
fatcat:ac54m6emvfdydkpcndwfd62o4u
Securing Low-cost RFID Systems: A Research Survey
2014
International Journal of RFID Security and Cryptography
authentication protocols and their designing requirements; and (3) non-conventional solutions leveraging physical characteristics of RFID tags or physical layer of the tag-reader communication for security ...
This paper provides a general overview of the rather broad area of RFID security and privacy and gives the main citations for the comprehensive understanding and further explorations of this area. ...
security for upper layers. ...
doi:10.20533/ijrfidsc.2046.3715.2014.0015
fatcat:skq7whrbwffhjf22v6ub672al4
GenePrint: Generic and accurate physical-layer identification for UHF RFID tags
2013
2013 21st IEEE International Conference on Network Protocols (ICNP)
GenePrint leverages the internal similarity among the pulses of tags' RN16 preamble signals to extract a hardware feature as the fingerprint. ...
In this paper, we propose a novel physical-layer identification system, GenePrint, for UHF passive tags. ...
We acknowledge the support from the codes of USRP2 reader from the Open RFID Lab (ORL) project [13] . ...
doi:10.1109/icnp.2013.6733574
dblp:conf/icnp/MaQLHZ13
fatcat:cosfaaeg5nbolde7vumzixtjcm
A Review on Performance Evaluation Criteria and Tools for Lightweight Block Ciphers
2019
International Journal of Advanced Trends in Computer Science and Engineering
There are several parameters for both hardware and software implementations that are set to assess the ciphers. ...
Security is considered as one of the most important concerns of constraint end nodes. ...
RFID tags are dealt in this standard [10] . RFID "Radio Frequency Identification" tags are the main components in IoT having a unique identifier to distinguish from other RFID tags in the network. ...
doi:10.30534/ijatcse/2019/47832019
fatcat:h53wq7vj6bfdxhuekl7t7cz2yi
A Toolbox for RFID Protocol Analysis
2012
2012 Fourth International EURASIP Workshop on RFID Technology
The tools focus on high frequency tags but one of them also supports low frequency. These tools are fully programable and allow for quick prototyping, testing and debugging of new RFID protocols. ...
In this paper, we propose three tools for the analysis of RFID protocols. These tools facilitate message eavesdropping and emulation of both tags and readers. ...
To analyze unknown RFID protocols it is very convenient to get a full trace of the transaction. ...
doi:10.1109/rfid.2012.19
fatcat:ec2bta2zabdxrbhnwcg34qmy3i
Drug distribution management system based on IoT
2022
KSII Transactions on Internet and Information Systems
In the production of drugs, a flexible RFID tag was printed on the packaging box, which stored a series of information such as drug name, dosage, raw materials, efficacy, production date, expiration date ...
The use of a drug distribution management system combined with RFID readers can identify drug information and effectively prevent the occurrence of erroneous, missed, counterfeit, and expired drugs. ...
EPC is one of the application fields of RFID technology. Only specific low-cost RFID tags are suitable for EPC systems [42] [43] [44] . ...
doi:10.3837/tiis.2022.02.004
fatcat:fg4npw3uzzgbtkcmp2rxzjp77y
Counterfeiting Detection in RFID-enabled Supply Chain
2013
Journal of Advanced Internet of Things
In this paper, a cost-sensitive learning approach is presented. The motivation of this work is to effectively reduce the overall cost of counterfeiting attack for RFID tagged products. ...
The challenge of implementing a cost-based counterfeit detection system in RFID supply chains is non-trivial because counterfeit tags exist across billions of RFID tags. ...
Acknowledgement This work is partially sponsored by Ministry of Higher Education Malaysia. ...
doi:10.7726/jait.2013.1002
fatcat:tudub65dqzgwres6vm2mqqpzii
A Survey of Internet of Things (IoT) Authentication Schemes
2019
Sensors
The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. ...
Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system ...
To resist against cloning attacks to the RFID tag, the authors of [84] proposed an offline authentication for RFID-tags based on PUF. ...
doi:10.3390/s19051141
fatcat:sc6et2p5vneyvietpdr4gr4ena
A NOVEL ARCHITECTURE FOR LIGHTWEIGHT BLOCK CIPHER, PICCOLO
2015
International Journal of Research in Engineering and Technology
The proposed system deals with an efficient implementation of Piccolo block cipher architecture that will fulfill mandatory requirements such as throughput and speed for low-resource devices like RFID ...
Cryptography plays a major role in the security of data transmission and the development of computing technology imposes stronger requirements on the cryptography schemes. ...
A new parallel architecture for Piccolo is designed that can meet the fulfillment of mandatory requirements for low-resource devices such as RFID tags and sensors. ...
doi:10.15623/ijret.2015.0409017
fatcat:evebockoifbidhx76h4pp76ulu
Multiple-polynomial LFSR based pseudorandom number generator for EPC Gen2 RFID tags
2011
IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society
We present a lightweight pseudorandom number generator (PRNG) design for EPC Gen2 RFID tags. ...
We show that our proposal has, moreover, a simpler hardware implementation and energy consumption than previous designs reported in the literature. ...
However, in the hardware layer design, a different approach shall be used. ...
doi:10.1109/iecon.2011.6119932
fatcat:ypgofkz6kfdgpnfrp7zgbcdygy
Lightweight Security Protocols for Internet of Things: A Review
2019
International Journal of Advanced Trends in Computer Science and Engineering
The paper also presents a comparative study of various lightweight security protocols for IoT, proposed by many researchers in recent years. ...
The present paper presents a range of various existing as well as proposed lightweight security protocols. ...
Pedro Peris Lopez et al. (2006) proposed a real lightweight mutual authentication protocol for low cost RFID tags, named as LMAP. ...
doi:10.30534/ijatcse/2019/58832019
fatcat:7wtxzomxcnfu7latkr3bl443e4
Studying the pseudo random number generator of a low-cost RFID tag
2011
2011 IEEE International Conference on RFID-Technologies and Applications
This aim of this is to examine the PRNG in use within the authentication protocol of the new NXP MIFARE Ultralight C RFID low-cost card. ...
Due to severe limitations in their computational and storage capabilities, many low-cost RFID tags have been shown to implement quite weak authentication protocols, largely due to weakness in their pseudorandom ...
This is a challenging task, due to the inherent limitations of these low-cost RFID tags. In this paper, two smart cards are discussed, the MIFARE 1K Classic and the recent MIFARE Ultralight C. ...
doi:10.1109/rfid-ta.2011.6068666
dblp:conf/rfidta/MerhiCP11
fatcat:zkickfy4rvbuplklddoy2oyx3y
Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities
2021
IEEE Access
Also, we have discussed the demand and a direction for new research in the area of lightweight cryptography to optimize balance amongst cost, performance and security. ...
To provide a holistic view of the area, in this paper, we have compared the existing algorithms in terms of implementation cost, hardware and software performances and attack resistance properties. ...
Normally, 200 to 2000 GE (out of 1000 to 10,000 GE of total available) are allocated for security reasons in an economical RFID tag [44] .
3) LATENCY It is the time to produce the cipher from the original ...
doi:10.1109/access.2021.3052867
fatcat:lidatyjdtrh4jirpxnnvgwsupi
« Previous
Showing results 1 — 15 out of 872 results