872 Hits in 8.5 sec

RFID Middleware Design and Architecture [chapter]

Mehdia Ajana El Khaddar, Mohammed Boulmalf, Hamid Harroud, Mohammed Elkoutbi
2011 Designing and Deploying RFID Applications  
This tag provides the security features of a Read-Only tag while adding the additional functionality of Read-Write tags. RFID tags operation frequencies RFID tags operate in several frequency bands.  ...  Unlike the other systems, line of sight is required for the communication between RFID reader and tags.  ...  A layer of the RFID middleware incorporates all the device drivers of different hardware and exposes to the application standard interfaces to access this hardware.  ... 
doi:10.5772/16917 fatcat:nwb72pussvbibm5nql4sydeozu

GenePrint: Generic and Accurate Physical-Layer Identification for UHF RFID Tags

Jinsong Han, Chen Qian, Panlong Yang, Dan Ma, Zhiping Jiang, Wei Xi, Jizhong Zhao
2016 IEEE/ACM Transactions on Networking  
GenePrint leverages the internal similarity among pulses of tags' RN16 preamble signals to extract a hardware feature as the fingerprint.  ...  In this paper, we propose a novel physical-layer identification system, GenePrint, for UHF passive tags.  ...  We are also trying to design a general physical-layer identification solution for a variety of wireless devices. IX. ACKNOWLEDGEMENTS  ... 
doi:10.1109/tnet.2015.2391300 fatcat:37up3ar7mzdczmw2fcolxdxfba

SLIM: A Lightweight Block Cipher for Internet of Health Things

Bassam W. Aboshosha, Rabie A. Ramadan, Ashutosh Dhar Dwivedi, Ayman El-Sayed, Mohamed M. Dessouky
2020 IEEE Access  
With simple operations on the RFID tag, it will be enabled to defend against different types of attacks, which make it very attractive to low-cost RFIDs.  ...  The proposed algorithm has an excellent performance in both hardware and software environments, with a limited implementation area of only 553 GE, an acceptable cost/security for RFID systems, and an energy-efficient  ... 
doi:10.1109/access.2020.3036589 fatcat:ac54m6emvfdydkpcndwfd62o4u

Securing Low-cost RFID Systems: A Research Survey

Qi Chai
2014 International Journal of RFID Security and Cryptography  
authentication protocols and their designing requirements; and (3) non-conventional solutions leveraging physical characteristics of RFID tags or physical layer of the tag-reader communication for security  ...  This paper provides a general overview of the rather broad area of RFID security and privacy and gives the main citations for the comprehensive understanding and further explorations of this area.  ...  security for upper layers.  ... 
doi:10.20533/ijrfidsc.2046.3715.2014.0015 fatcat:skq7whrbwffhjf22v6ub672al4

GenePrint: Generic and accurate physical-layer identification for UHF RFID tags

Dan Ma, Chen Qian, Wenpu Li, Jinsong Han, Jizhong Zhao
2013 2013 21st IEEE International Conference on Network Protocols (ICNP)  
GenePrint leverages the internal similarity among the pulses of tags' RN16 preamble signals to extract a hardware feature as the fingerprint.  ...  In this paper, we propose a novel physical-layer identification system, GenePrint, for UHF passive tags.  ...  We acknowledge the support from the codes of USRP2 reader from the Open RFID Lab (ORL) project [13] .  ... 
doi:10.1109/icnp.2013.6733574 dblp:conf/icnp/MaQLHZ13 fatcat:cosfaaeg5nbolde7vumzixtjcm

A Review on Performance Evaluation Criteria and Tools for Lightweight Block Ciphers

Deepti Sehrawat, Maharshi Dayanand University, Rohtak, Haryana (India)
2019 International Journal of Advanced Trends in Computer Science and Engineering  
There are several parameters for both hardware and software implementations that are set to assess the ciphers.  ...  Security is considered as one of the most important concerns of constraint end nodes.  ...  RFID tags are dealt in this standard [10] . RFID "Radio Frequency Identification" tags are the main components in IoT having a unique identifier to distinguish from other RFID tags in the network.  ... 
doi:10.30534/ijatcse/2019/47832019 fatcat:h53wq7vj6bfdxhuekl7t7cz2yi

A Toolbox for RFID Protocol Analysis

Roel Verdult, Gerhard de Koning Gans, Flavio D. Garcia
2012 2012 Fourth International EURASIP Workshop on RFID Technology  
The tools focus on high frequency tags but one of them also supports low frequency. These tools are fully programable and allow for quick prototyping, testing and debugging of new RFID protocols.  ...  In this paper, we propose three tools for the analysis of RFID protocols. These tools facilitate message eavesdropping and emulation of both tags and readers.  ...  To analyze unknown RFID protocols it is very convenient to get a full trace of the transaction.  ... 
doi:10.1109/rfid.2012.19 fatcat:ec2bta2zabdxrbhnwcg34qmy3i

Drug distribution management system based on IoT

2022 KSII Transactions on Internet and Information Systems  
In the production of drugs, a flexible RFID tag was printed on the packaging box, which stored a series of information such as drug name, dosage, raw materials, efficacy, production date, expiration date  ...  The use of a drug distribution management system combined with RFID readers can identify drug information and effectively prevent the occurrence of erroneous, missed, counterfeit, and expired drugs.  ...  EPC is one of the application fields of RFID technology. Only specific low-cost RFID tags are suitable for EPC systems [42] [43] [44] .  ... 
doi:10.3837/tiis.2022.02.004 fatcat:fg4npw3uzzgbtkcmp2rxzjp77y

Counterfeiting Detection in RFID-enabled Supply Chain

Manmeet Mahinderjit-Singh, Xue Li, Zhanhuai Li
2013 Journal of Advanced Internet of Things  
In this paper, a cost-sensitive learning approach is presented. The motivation of this work is to effectively reduce the overall cost of counterfeiting attack for RFID tagged products.  ...  The challenge of implementing a cost-based counterfeit detection system in RFID supply chains is non-trivial because counterfeit tags exist across billions of RFID tags.  ...  Acknowledgement This work is partially sponsored by Ministry of Higher Education Malaysia.  ... 
doi:10.7726/jait.2013.1002 fatcat:tudub65dqzgwres6vm2mqqpzii

A Survey of Internet of Things (IoT) Authentication Schemes

Mohammed El-hajj, Ahmad Fadlallah, Maroun Chamoun, Ahmed Serhrouchni
2019 Sensors  
The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other.  ...  Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system  ...  To resist against cloning attacks to the RFID tag, the authors of [84] proposed an offline authentication for RFID-tags based on PUF.  ... 
doi:10.3390/s19051141 fatcat:sc6et2p5vneyvietpdr4gr4ena


Rahiyanath T. Y. .
2015 International Journal of Research in Engineering and Technology  
The proposed system deals with an efficient implementation of Piccolo block cipher architecture that will fulfill mandatory requirements such as throughput and speed for low-resource devices like RFID  ...  Cryptography plays a major role in the security of data transmission and the development of computing technology imposes stronger requirements on the cryptography schemes.  ...  A new parallel architecture for Piccolo is designed that can meet the fulfillment of mandatory requirements for low-resource devices such as RFID tags and sensors.  ... 
doi:10.15623/ijret.2015.0409017 fatcat:evebockoifbidhx76h4pp76ulu

Multiple-polynomial LFSR based pseudorandom number generator for EPC Gen2 RFID tags

Joan Melia-Segui, Joaquin Garcia-Alfaro, Jordi Herrera-Joancomarti
2011 IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society  
We present a lightweight pseudorandom number generator (PRNG) design for EPC Gen2 RFID tags.  ...  We show that our proposal has, moreover, a simpler hardware implementation and energy consumption than previous designs reported in the literature.  ...  However, in the hardware layer design, a different approach shall be used.  ... 
doi:10.1109/iecon.2011.6119932 fatcat:ypgofkz6kfdgpnfrp7zgbcdygy

Lightweight Security Protocols for Internet of Things: A Review

Deepti Rani, Maharshi Dayanand University, Rohtak, Haryana (India)
2019 International Journal of Advanced Trends in Computer Science and Engineering  
The paper also presents a comparative study of various lightweight security protocols for IoT, proposed by many researchers in recent years.  ...  The present paper presents a range of various existing as well as proposed lightweight security protocols.  ...  Pedro Peris Lopez et al. (2006) proposed a real lightweight mutual authentication protocol for low cost RFID tags, named as LMAP.  ... 
doi:10.30534/ijatcse/2019/58832019 fatcat:7wtxzomxcnfu7latkr3bl443e4

Studying the pseudo random number generator of a low-cost RFID tag

Mohamad Merhi, Julio Cesar Hernandez-Castro, Pedro Peris-Lopez
2011 2011 IEEE International Conference on RFID-Technologies and Applications  
This aim of this is to examine the PRNG in use within the authentication protocol of the new NXP MIFARE Ultralight C RFID low-cost card.  ...  Due to severe limitations in their computational and storage capabilities, many low-cost RFID tags have been shown to implement quite weak authentication protocols, largely due to weakness in their pseudorandom  ...  This is a challenging task, due to the inherent limitations of these low-cost RFID tags. In this paper, two smart cards are discussed, the MIFARE 1K Classic and the recent MIFARE Ultralight C.  ... 
doi:10.1109/rfid-ta.2011.6068666 dblp:conf/rfidta/MerhiCP11 fatcat:zkickfy4rvbuplklddoy2oyx3y

Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities

Vishal A. Thakor, Mohammad Abdur Razzaque, Muhammad R. A. Khandaker
2021 IEEE Access  
Also, we have discussed the demand and a direction for new research in the area of lightweight cryptography to optimize balance amongst cost, performance and security.  ...  To provide a holistic view of the area, in this paper, we have compared the existing algorithms in terms of implementation cost, hardware and software performances and attack resistance properties.  ...  Normally, 200 to 2000 GE (out of 1000 to 10,000 GE of total available) are allocated for security reasons in an economical RFID tag [44] . 3) LATENCY It is the time to produce the cipher from the original  ... 
doi:10.1109/access.2021.3052867 fatcat:lidatyjdtrh4jirpxnnvgwsupi
« Previous Showing results 1 — 15 out of 872 results