29,836 Hits in 0.68 sec

Basic RFID Security

Marc Ruef
2011 Zenodo  
This leads to variations in functionality and use of RFID technology, depending on the user's location.  ...  RFID is not internationally standardized. Standards and recommendations vary from country to country and from industry to industry.  ...  Finding a compromise between economy and security is paramount when implementing RFID technology.  ... 
doi:10.5281/zenodo.3520645 fatcat:bzmnmt2qnzfxfil2cgwlxntyhq

Securely disseminating RFID events

Florian Kerschbaum
2011 Proceedings of the 5th ACM international conference on Distributed event-based system - DEBS '11  
We prove our scheme secure under the Modified Bilinear Decisional Diffie-Hellman Assumption.  ...  This method of dissemination immediately raises security concerns, since supply chain operations' data is considered sensitive by companies.  ...  It needs to be encrypted on the RFID tag to evade rogue readers and it needs to be stored securely in order to prevent theft.  ... 
doi:10.1145/2002259.2002302 dblp:conf/debs/Kerschbaum11 fatcat:bax5e7l7lrfkfeqiitu5geb75m

How Secure is RFID?

S. Ortiz
2006 Computer  
Vrije Universiteit: viruses Security experts have not reported finding any RFID viruses in the wild.  ...  Advantages Because RFID is simple, it is generally inexpensive, which is practical for use in high-volume settings such as stores and warehouses. How Secure Is RFID?  ...  According to Vrije's Rieback, sound software-development techniques will help make RFID more secure. ■ Figure 2 .  ... 
doi:10.1109/mc.2006.232 fatcat:jgkyknwlong5dibvylul6lqmhq

Low Overhead RFID Security [chapter]

Mikhail Nesterenko, Thomas Clouser, Marina Kopeetsky, Shlomi Dolev
2008 RFID Handbook  
Thus, the design of security protection for RFID systems is challenging.  ...  Approaches to RFID Security Using Traditional Cryptography There is a large number of recent studies that consider RFID security. Avoine [1] maintains an extensive bibliography on the subject.  ... 
doi:10.1201/9781420055009.ch32 fatcat:5c6zatwn2rh6ldxr7ueoyoq7me

Secure Authentication Using RFID

Mohit Chitlange
2012 International Journal of Computer Science Engineering and Applications  
Using feature provided by RFID to detect multiple individuals with very short amount of time and provide security with image pattern matching algorithm.  ...  To implement this system, we will interface camera with RFID enabled system which will use Low Frequency (LF) RFID tags. On every detection the camera will capture photograph.  ...  Every individual having RFID enabled identity can be detected in very short amount of time. But problem of secured authentication comes into the picture here.  ... 
doi:10.5121/ijcsea.2012.2107 fatcat:5buuze6wsjh47jw4z26bagpnim

RFID Security and Privacy [chapter]

Michel Arnaud
2011 Deploying RFID - Challenges, Solutions, and Open Issues  
Conclusion All TG RFID follow a common security concept.  ...  Whereas RFID Recommendation is primarily directed towards privacy and data protection, TG RFID cover all three security domains: safety, security and privacy.  ...  RFID Security and Privacy, Deploying RFID -Challenges, Solutions, and Open Issues, Dr.  ... 
doi:10.5772/17463 fatcat:lltsdi4bjjao7gumfvss6hhsay

The Vision of Secure RFID

Ari Juels
2007 Proceedings of the IEEE  
In other words, the problems of authentication and privacy are fundamental to RFID security.  ...  Much of the recent ferment around RFID has focused  ...  In other words, the problems of authentication and privacy are fundamental to RFID security.  ... 
doi:10.1109/jproc.2007.900324 fatcat:2occgruzafej3bifkd4maqdesm

A Security Framework in RFID

Pawankumar Tanavarappu
2020 Zenodo  
and RFID inter domain system security.  ...  This topic generally describes about the security and privacy mechanism in RFID multi domain which is further divided into three sub topics that is RFID forehand system security, RFID backhand system security  ...  RFID backend system are of twofold that is entity security in backend system and communication security between entities. The entities in RFID backend system need to secure against threats.  ... 
doi:10.5281/zenodo.3854949 fatcat:dte6s36vyjd4dfdwa5icdwipxq

Security Enhanced Rfid Middleware System

Jieun Song, Taesung Kim, Sokjoon Lee, Howon Kim
2007 Zenodo  
Our system enables secure RFID middleware service and trusted e-business service.  ...  In order to guarantee trusted e-business based on RFID technology, we propose a security enhanced RFID middleware system.  ...  In order to guarantee trusted e-business based on RFID technology, we propose a security enhanced RFID middleware system.  ... 
doi:10.5281/zenodo.1077818 fatcat:io3wy66zo5dnzpmgqwopw5qjle

RFID security without extensive cryptography

Sindhu Karthikeyan, Mikhail Nesterenko
2005 Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks - SASN '05  
In this paper we propose an efficient RFID tag identification algorithm that incorporates reader-authentication. Our algorithm is secure against the anticipated threats to RFID systems.  ...  To further enhance the utility of our algorithm we propose a scheme that allows for the algorithm to carry out secure identification of multiple tags simultaneously.  ...  Security agents deployed throughout the area of RFID use are to modify the data carried by the tag.  ... 
doi:10.1145/1102219.1102229 dblp:conf/sasn/KarthikeyanN05 fatcat:rsb2pog3sfdqvm4cnnjyde4n5i

Secure RFID Ownership Transfer Protocols [chapter]

Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan
2013 Lecture Notes in Computer Science  
In this paper, we formally define the security model of ownership transfer protocols and propose a secure ownership transfer protocol.  ...  In this paper, we formally define the security model of ownership transfer protocols and propose a secure ownership transfer protocol.  ...  There are two experiments defined in our security model. An RFID ownership transfer protocol is secure iff it is secure in both experiments.  ... 
doi:10.1007/978-3-642-38033-4_14 fatcat:6nf3owfl3vhsphkfopvqyxyccu

RFID Security and Privacy Enhancement

2019 International Journal of Engineering and Advanced Technology  
tags with efficient sensing techniques.This methodology proves to be more secure as it is independent on man power and other devices.  ...  location will be considered for this.This information can be taken for defend measures to avoid unauthorized access.Secured schemes will be employed for transaction on server side.Our work focuses on using RFID  ...  This advancement RFID Security and Privacy Enhancement Published By: Blue Eyes Intelligence Engineering & Sciences Publication Retrieval Number: F10860886S219 /2019©BEIESP DOI:10.35940/ijeat.F1086.0886S219  ... 
doi:10.35940/ijeat.f1086.0886s219 fatcat:t5untre6lzhxpo7vu25abnhrni

Secure RFID for Humanitarian Logistics [chapter]

Gianmarco Baldini, Franco Oliveri, Hermann Seuschek, Erwin Hess, Michael Brau
2011 Designing and Deploying RFID Applications  
Secure RFID in humanitarian logistics Need for secure RFID As described in the previous sections, a major issue in natural disasters and emergency crises is security.  ...  RFID security Like other wireless technologies, RFID is vulnerable to a wide range of security threats, which have been identified in literature.  ...  Secure RFID for Humanitarian Logistics, Designing and Deploying RFID Applications, Dr.  ... 
doi:10.5772/19984 fatcat:n7skuqawnbdbxpj65k42pphqkq

Multilevel Security Protocol using RFID

Syed Faiazuddin, S. Venkat, S.C.V.Ramana Rao, M.V.Sainatha Rao, P.Sathish Kumar
2011 International Journal of Advanced Computer Science and Applications  
In this work, we have considered some existing security protocols of RFID system and analyzed the possible security threats at each level.  ...  Though RFID provides automatic object identification, yet it is vulnerable to various security threats that put consumer and organization privacy at stake.  ...  Hence, the security of RFID tags and the stored ID is of extreme importance and sensing : probable security loopholes we have proposed a :k monitoring protocol that would reduce the security threats due  ... 
doi:10.14569/ijacsa.2011.020221 fatcat:4uqibmn4kfg7dn6gmsxnvk3due

Secure vehicle tracking using RFID

Alseadoon et al., College of Computer Science and Engineering, University of Hail, Hail, Saudi Arabia
2019 International Journal of Advanced and Applied Sciences  
This paper also suggests other localization technology along with GPS for accurate localization such as RFID in addition to proposing a lightweight security algorithm for tracking information.  ...  This paper concerns the security of vehicles tracking information for the sake of transportation security.  ...  Also, the board and the RFID readers are set to have the SIT security algorithm implemented on them.  ... 
doi:10.21833/ijaas.2019.10.001 fatcat:u72rhzfth5etnfacpq3semjijm
« Previous Showing results 1 — 15 out of 29,836 results