Filters








1,346 Hits in 3.7 sec

RFID Distance Bounding Protocols with Mixed Challenges

Chong Hee Kim, Gildas Avoine
2011 IEEE Transactions on Wireless Communications  
In this article, we introduce new distance bounding protocols, based on binary mixed challenges, that converge toward the expected and optimal (1/2) n bound and which only require little memory.  ...  RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud, and terrorist fraud.  ...  DISTANCE BOUNDING PROTOCOLS USING MIXED CHALLENGES: KA1 AND KA1 + A.  ... 
doi:10.1109/twc.2011.030411.101158 fatcat:7hm3o3kkmbfp5omzxk4sdqjtmu

RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks [chapter]

Chong Hee Kim, Gildas Avoine
2009 Lecture Notes in Computer Science  
In this paper, we introduce a new protocol based on binary mixed challenges that converges toward the expected and optimal (1/2) n bound.  ...  All the existing distance bounding protocols based on binary challenges, without final signature, provide an adversary success probability equal to (3/4) n where n is the number of rounds in the protocol  ...  In this paper, we proposed a new protocol with (binary) mixed challenges that provides the best performances among all the existing distance bounding protocols with binary challenges that do no use final  ... 
doi:10.1007/978-3-642-10433-6_9 fatcat:gpz4uzui6zf3flmi2trju3lvom

Lightweight Distance bound Protocol for Low Cost RFID Tags [article]

Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem
2010 arXiv   pre-print
This paper proposes a lightweight distance bound protocol for low cost RFID tags. The proposed protocol based on modified version of Gossamer mutual authentication protocol.  ...  All the existing distance bounding protocols use random number generator and hash functions at the tag side which make them inapplicable at low cost RFID tags.  ...  Modified Gossamer protocol [1] can be combined with distance bound protocol using mixed challenges to make distance bound protocol applicable on low cost RFID tags by removing random number generation  ... 
arXiv:1004.1237v2 fatcat:ew45foipuraq7naqapirxfmjlm

Low-power Distance Bounding [article]

Aanjhan Ranganathan, Boris Danev, Srdjan Capkun
2014 arXiv   pre-print
In this work, we propose a new physical layer scheme for distance bounding and leverage this scheme to implement a distance bounding system with a low-power prover.  ...  protocols developed in prior art.  ...  Hancke and Kuhn [16] introduced one of the first distance bounding protocols suitable for computationally constrained devices such as RFID with a specific prover design.  ... 
arXiv:1404.4435v2 fatcat:7tykufqqyzfppbil4kbowvgsem

Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks [article]

Pedro Peris-Lopez, Julio C. Hernandez-Castro, Christos Dimitrakakis, Aikaterini Mitrokotsa, Juan M. E. Tapiador
2010 arXiv   pre-print
Distance bounding protocols represent a promising countermeasure to hinder relay attacks.  ...  In 2008, Kim et al. [1] proposed a new distance bounding protocol with the objective of being the best in terms of security, privacy, tag computational overhead and fault tolerance.  ...  The Hitomi RFID Distance Bounding Protocol In this section, a new RFID distance bounding protocol is presented.  ... 
arXiv:0906.4618v2 fatcat:o3orzslvy5bqlgdg5gg4qcxkui

Privacy in RFID and mobile objects [article]

Rolando Trujillo-Rasua
2013 arXiv   pre-print
Moreover, we present a novel distance-bounding protocol based on graphs that is extremely low-resource consuming.  ...  However, since tags are resource-constrained devices sending identification data wirelessly, designing secure and private RFID identification protocols is a challenging task.  ...  This clearly opens the challenge of designing distance-bounding protocols dedicated to RFID tags [100] . Furthermore, the proper use of RFID data still is an open issue.  ... 
arXiv:1310.5476v1 fatcat:7lz5b242z5ht5hwzso4qffdojm

Securing Low-cost RFID Systems: A Research Survey

Qi Chai
2014 International Journal of RFID Security and Cryptography  
variant of DES [62]; and (3) inventing brand new primitives/protocols with small hardware footprint, e.g., PRINTCipher [57].  ...  authentication protocols and their designing requirements; and (3) non-conventional solutions leveraging physical characteristics of RFID tags or physical layer of the tag-reader communication for security  ...  Their key idea is to let the passive verifiers learn the distance bounds while the active verifier executes distance bounding with the prover.  ... 
doi:10.20533/ijrfidsc.2046.3715.2014.0015 fatcat:skq7whrbwffhjf22v6ub672al4

Security Vulnerabilities in RFID Networks

Junaid Ahsenali Chaudhry, Malrey Lee
2013 International journal of advanced smart convergence  
In this paper, the researcher explains existing security challenges in RFID networks then the effects of these threats on security and privacy of RFID are discussed.  ...  After analyzing security challenges of RFID networks, different countermeasures that are proposed by other researchers are discussed.  ...  Recently, Chong Hee (2011) proposed a more secure protocol based on binary mixed challenges. • Side channel analysis and protection on RFID: The electromagnetic analysis of high frequency (HF) RFID tag  ... 
doi:10.7236/ijasc2013.2.2.7 fatcat:lsynrr4srvcttpdredyqjkh57i

RFID security and privacy: a research survey

A. Juels
2006 IEEE Journal on Selected Areas in Communications  
RFID tags are small, wireless devices that help identify objects and people.  ...  This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID).  ...  Some approaches to distance-bounding countermeasures are proposed in, e.g., [21] and [29] . B.  ... 
doi:10.1109/jsac.2005.861395 fatcat:rv6e4c26lbhsjfs5kthw7tpvvy

Energy Management in RFID-Sensor Networks: Taxonomy and Challenges

Shaik Shabana Anjum, Rafidah Md Noor, Mohammed Hossien Anisi, Ismail Bin Ahmedy, Fazidah Othman, Muhammad Alam, Muhammad Khurran Khan
2017 IEEE Internet of Things Journal  
The taxonomy on various challenges for EM in RSN has also been articulated for open research directives.  ...  The two main techniques for EM in RFID Sensor Networks (RSN) are Energy Harvesting (EH) and Energy Transfer (ET).  ...  They are i) integrating tags with sensors ii) integrating tags with WSN nodes and wireless devices iii) integrating readers with WSN nodes and wireless devices and iv) a mix of RFID and WSNs.  ... 
doi:10.1109/jiot.2017.2728000 fatcat:mwhyjp5fkfewdnqoedtfws7q2i

A Wearable RFID System for Real-Time Activity Recognition Using Radio Patterns [chapter]

Liang Wang, Tao Gu, Hongwei Xie, Xianping Tao, Jian Lu, Yu Huang
2014 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
We develop a prototype system which consists of a wearable RFID system and a smartphone to demonstrate the working principles, and conduct experimental studies with four subjects over two weeks.  ...  The results show that our system achieves a high recognition accuracy of 93.6% with a latency of 5 seconds.  ...  We use Impinj R2000 RFID reader module powered by a Li battery with 9000mAh capacity. The size of the reader is 15×9×2.5 cm. We use UHF RFID tags with a credit card size.  ... 
doi:10.1007/978-3-319-11569-6_29 fatcat:pzm3ise62bgz5pkenedzw6duva

A Study of Security Vulnerabilities in Mobile environment

Suk-jin Kim, Hyangran Lee, Malrey Lee
2015 The International Journal of Advanced Culture Technology  
In this paper, the researcher explains existing security challenges in RFID networks then the effects of these threats on security and privacy of RFID are discussed.  ...  After analyzing security challenges of RFID networks, different countermeasures that are proposed by other researchers are discussed.  ...  Recently, Chong Hee (2011) proposed a more secure protocol based on binary mixed challenges.  Side channel analysis and protection on RFID: The electromagnetic analysis of high frequency (HF) RFID tag  ... 
doi:10.17703/ijact.2015.3.2.149 fatcat:dbf3vgagajf7va4pdxxbkqy4le

Towards More Efficient Cardinality Estimation for Large-Scale RFID Systems

Yuanqing Zheng, Mo Li
2014 IEEE/ACM Transactions on Networking  
Radio frequency identification (RFID) cardinality estimation with an accuracy guarantee is of practical importance in various large-scale RFID applications.  ...  This paper proposes a fast RFID cardinality estimation protocol, named Zero-One Estimator (ZOE). ZOE only requires 1-bit response from the RFID tags per estimation round.  ...  We implement a prototype system based on the GNU-Radio/USRP platform in concert with the WISP RFID tags. ZOE only requires slight updates to the EPCglobal C1G2 standard.  ... 
doi:10.1109/tnet.2013.2288352 fatcat:ebomufw4pbfednc6kkdfqo3mue

Distributed receiving in RFID systems

Kashif Ali, Hossam Hassanein
2009 2009 IEEE 34th Conference on Local Computer Networks  
Such micro-zones facilitate the novel concept of multi-point communication in RFID systems.  ...  This paper remedies such hindrance by introducing the novel paradigm of distributed receiving in RFID systems.  ...  Thus, passive tags are bounded by the forward-link channel.  ... 
doi:10.1109/lcn.2009.5355171 dblp:conf/lcn/AliH09 fatcat:de4zzmcosrcjnnfg6zffb5j4hy

RFID Applications in Cyber-Physical System [chapter]

Nan Wu, Xiangdong Li
2011 Deploying RFID - Challenges, Solutions, and Open Issues  
Classification of RFID tags www.intechopen.comDeploying RFID -Challenges, Solutions, and Open Issues  ...  From the communication protocol point of view, an active RFID reader and its corresponding tags can work with a one-to-many model (and vice versa): one tag can be coupled with many readers (the reader  ...  We hope this book will be useful for engineers, researchers and industry personnel, and provide them with some new ideas to address current and future issues they might be facing.  ... 
doi:10.5772/17464 fatcat:5hzhq6u6sbe2xj6qmjjm5sjsgy
« Previous Showing results 1 — 15 out of 1,346 results