359 Hits in 5.6 sec

Improved (and Practical) Public-Key Authentication for UHF RFID Tags [chapter]

Sébastien Canard, Loïc Ferreira, Matt Robshaw
2013 Lecture Notes in Computer Science  
CRYPTOGPS has been promoted as a public-key technology suitable for UHF RFID tag authentication.  ...  asymmetric UHF tag authentication with reduced communication and protocol complexity.  ...  We are moreover grateful to the anonymous referees for their interesting and useful comments.  ... 
doi:10.1007/978-3-642-37288-9_4 fatcat:qi5bsottfvb4zingupd63mya7q

Next Generation Auto-Identification and Traceability Technologies for Industry 5.0: A Methodology and Practical Use Case for the Shipbuilding Industry

Paula Fraga-Lamas, Jose Varela-Barbeito, Tiago M. Fernandez-Carames
2021 IEEE Access  
In practice, active UHF RFID and Dash7 are similar in terms of performance, so the former was selected together with passive UHF RFID to carry out the implementation and empirical evaluations described  ...  For such a use case, the performance of UHF RFID is evaluated in real environments when using different tags.  ... 
doi:10.1109/access.2021.3119775 fatcat:oain4hs3r5dldj6bz3pvydryaq

A framework for traceability of hides for improved supply chain coordination

Maitri Thakur, Guro Møen Tveit, Geir Vevle, Tufan Yurt
2020 Computers and Electronics in Agriculture  
Costs and benefits of proposed technologies are presented. Security concerns related to the use of RFID tags are also discussed.  ...  A traceability system for the Norwegian hides supply chain is proposed in this paper. Various data capture technologies including RFID, dot peening and laser engraving were tested in a pilot setting.  ...  The authors thank Norilia and Nortura for their valuable input to the study and allowing for the pilot tests to be conducted in their facilities.  ... 
doi:10.1016/j.compag.2020.105478 fatcat:sjzwvt6q6fcd7f7abediejqste

Smart Solutions for RFID based Inventory Management Systems: A Survey

Ali Alwadi, Amjad Gawanmeh, Sazia Parvin, Jamal N. Al-Karaki
2017 Scalable Computing : Practice and Experience  
In addition, the latest researches in the RFID infrastructure and middle wares are evaluated. This includes passive RFID Tags, RFID Antennas, RFID middleware, and the RFID Reader.  ...  We first outline the design challenges for RFID-based inventory management systems followed by a comprehensive survey of various RFID technologies, RFID types, and RFID architectures.  ...  Cloud plays a key role in RFID identification process through: • Managing the hardware resources in the RFID network efficiently, RFID readers, antennas, and tags. • Managing the information flow from/  ... 
doi:10.12694/scpe.v18i4.1333 fatcat:bvgqjzilozbndnoi5on4pfzcmq

An Energy-Efficient ECC Processor of UHF RFID Tag for Banknote Anti-Counterfeiting

Xi Tan, Mianxiong Dong, Cheng Wu, Kaoru Ota, Junyu Wang, Daniel W. Engels
2017 IEEE Access  
(RFID) tags that are usable for banknote authentication and anti-counterfeiting.  ...  This size, speed, and power of the ECC processor makes it practical to use within a passive UHF RFID tag and achieve up to 1500 banknote authentications per minute, which is sufficient for use in the fastest  ...  The tag has a static public/private key pair and a public key certificate.  ... 
doi:10.1109/access.2016.2615003 fatcat:ouei4q3i4vbxvhszgktdhrtice

Security Framework for RFID-based Applications in Smart Home Environment

Divyan M. Konidala, Dae-Young Kim, Chan-Yeob Yeun, Byoung-Cheon Lee
2011 Journal of Information Processing Systems  
We can find many previously proposed schemes that focus solely on: authentication between the RFID tags and readers, and user privacy protection from malicious readers.  ...  We then identify their related privacy and security threats and security requirements and also propose a secure approach, where RFID-tagged consumer items, RFID-reader enabled appliances (e.g., refrigerators  ...  Alice would then configure the appliance with its private key and public-key certificate and also install the public-key certificate of the home server, in order for the appliance and the home server to  ... 
doi:10.3745/jips.2011.7.1.111 fatcat:io5rrxsknrc5tf2suswennbyge

Standards, Security & Privacy Issues about Radio Frequency Identification (RFID)

Evsen Korkmaz, Alp Ustundag
2007 2007 1st Annual RFID Eurasia  
Although developments in RFID technology begun nearly 50 years ago, recent advances provided new opportunities improving commerce and everyday life.  ...  The microscopic beads (RFID tags) can be embedded in inks to track banknotes and other important documents.  ...  Public key approach necessitates high computation power for RFID tags. Thus, the cost and also the size of RFID tags are greater for item-level tagging.  ... 
doi:10.1109/rfideurasia.2007.4368148 fatcat:zsskgvt77ncjfnmr5c4lt4qscu

The Role of RFID in Green IoT: A Survey on Technologies, Challenges and a Way Forward

Zainatul Yushaniza Mohamed Yusoff, Mohamad Khairi Ishak, Kamal Ali Alezabi
2021 Advances in Science, Technology and Engineering Systems  
The benefits and examples of RFID applications, including their key advantages and disadvantages, are also discussed.  ...  Massive machines and devices are therefore linked and communicate with them. The use of resources in this area presents new challenges for this technology.  ...  Acknowledgment The authors would like to thank Majlis Amanah Rakyat (MARA) and Universiti Sains Malaysia, for providing the financial support under Research Grant RUI(1001/PELECT/8014049) to carry out  ... 
doi:10.25046/aj060103 fatcat:plofdecp6zespcblkqe7a567vi

Confronting Security and Privacy Threats in Modern RFID Systems

Damith C. Ranasinghe, Peter H. Cole
2006 2006 Fortieth Asilomar Conference on Signals, Systems and Computers  
The paper also describes a simple security model and briefly considers some of the vulnerabilities faced by such low cost RFID systems.  ...  The modern form of RFID technology that is set to dominate is that enabled by low cost RFID technology.  ...  ACKNOWLEDGMENT The authors would like to thank Alf Grasso for his help in improving the clarity of this work and Braden Phillips for his many inputs and my dear colleague Raja Gohosal for all his support  ... 
doi:10.1109/acssc.2006.355129 fatcat:x5y5ljwa7zfthfdlgg4itnny7y

Study on UHF RFID Authentication Protocol

Yuanyi Dang, Angang Zheng, Zhenliu Zhou, Yunlong Yi
2013 2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics  
Authentication and privacy-preserving are two important security properties for a cryptographic protocol for RFID tags.  ...  In response to this issue, Ryu and Takagi proposed an RFID authentication protocol which provides a way to trade-off security and memory for performance.  ...  database N Number of tags in D auth S Authentication token of server T RFID tag ID Tag identifier auth T Authentication token of tag K Secret key shared between server and a tag f A pseudorandom  ... 
doi:10.1109/ihmsc.2013.239 fatcat:xv27gvbff5gonozhbsymlzmtuq

Practical eavesdropping and skimming attacks on high-frequency RFID tokens

Gerhard P. Hancke, Yingjiu Li, Jianying Zhou
2011 Journal of Computer Security  
We present a brief overview of the radio characteristics for popular HF RFID standards and present some practical results for eavesdropping experiments against tokens adhering to the ISO 14443 and ISO  ...  In this paper we revisit the topic of RFID eavesdropping and skimming attacks, surveying previous work and explaining why the feasibility of practical attacks is still a relevant and novel research topic  ...  These attacks are a well known risk for RFID devices, yet few publications give details about possible experimental setup or practical results.  ... 
doi:10.3233/jcs-2010-0407 fatcat:zbhot2unnvcwpby2av22cjkbfe

RFID Technologies & Internet of Things

Luigi Patrono
2013 Journal of Communications Software and Systems  
Fifteen papers were submitted and ten of them have been recommended for publication based on the standard reviewing process.  ...  Ilaria Sergi, and Luciano Tarricone, demonstrate that passive RFID technology in UHF band can be efficiently used to create an innovative tracking system for laboratory animals, in order to support the  ...  They present two protocols to generate encryption keys independently at the RFID tag and the server.  ... 
doi:10.24138/jcomss.v9i1.152 fatcat:scd2xs2n7nehlmdkupwda75a4a

Accessibility of Radio Frequency Identification Technology in Facilities Maintenance

Chien-Ho Ko, Department of Civil Engineering, National Pingtung University of Science and Technology
2017 Journal of Engineering, Project, and Production Management  
The results of this study can be taken as reference for the use of RFID in facilities maintenance and management.  ...  encoding of equipment, rapid reading and encoding of tag information, and tag-based data storage.  ...  This research was funded by the Architecture and Building Research Institute (Taiwan).  ... 
doi:10.32738/jeppm.201701.0006 fatcat:kucv5eb6xrftxoyc4f43oqnrka

Evaluation of RAIN RFID authentication schemes

Ahmad Shahrafidz Khalid, Emmanuel Conchon, Fabrice Peyrard
2016 2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)  
(Abstract-In this paper, we present different authentication schemes of Radio Frequency Identification (RFID) Generation 2 version 2 (Gen2V2) in UHF mode.  ...  , Ahmad Shahrafidz Bin and Conchon, Emmanuel and Peyrard, Fabrice Evaluation of RAIN RFID authentication schemes.  ...  V = −[s]P = (x v , y v ) (11) V is the public key and s is the private key.  ... 
doi:10.1109/ssic.2016.7571807 dblp:conf/ssic/KhalidCP16 fatcat:frinll6przgb5ku3wgdgp4ngtq

RFID Technology, Security Vulnerabilities, and Countermeasures [chapter]

Qinghan Xiao, Thomas Gibbons, Herv Lebru
2009 Supply Chain the Way to Flat Organisation  
RFID technology has been around for about 60 years and was originally developed for improving warfare technologies.  ...  • It is better to use public key (asymmetric) encryption rather than secret key (symmetric) encryption. RFID-Zapper There are several ways to deactivate passive RFID tags.  ...  Supply chain management (SCM) has been both an emergent field of practice and an academic domain to help firms satisfy customer needs more responsively with improved quality, reduction cost and higher  ... 
doi:10.5772/6668 fatcat:vopadtcnfvhndmflyakqs2nphy
« Previous Showing results 1 — 15 out of 359 results