307 Hits in 4.7 sec

Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols [chapter]

Gildas Avoine, Iwen Coisel, Tania Martin
2010 Lecture Notes in Computer Science  
The publication of hundred RFID-based authentication protocols during the last decade raised the need of designing a dedicated privacy model.  ...  Finally, we suggest some methods that make RFID-based authentication protocols immune to such attacks.  ...  One option to preempt such a worry is to build secure RFID authentication protocols, in order to ensure privacy for RFID users.  ... 
doi:10.1007/978-3-642-16822-2_13 fatcat:yvf3gj76b5a63ijv6z2px6wmom

Analysis of RFID Application for U-healthcare System in Internet of Things

Jung Tae Kim
2014 International Journal of Smart Home  
Many researcher works to implement security system with low cost and privacy protocol to increase the applicability.  ...  Attackers can also threaten the security of systems. It depends on the original characteristics of RFID. The representative attack is the denial of service attack.  ...  The measures can be categorized into four security layers: Authentication based on network, authentication based on application, database protection and user's privacy.  ... 
doi:10.14257/ijsh.2014.8.6.13 fatcat:kixqngaa4zcftbqopodhpjrucm

Privacy and security in library RFID

David Molnar, David Wagner
2004 Proceedings of the 11th ACM conference on Computer and communications security - CCS '04  
We give a general scheme for building private authentication with work logarithmic in the number of tags, given a scheme with linear work as a sub-protocol.  ...  Unlike supplychain RFID, library RFID requires item-level tagging, thereby raising immediate patron privacy issues.  ...  In particular, we show efficient protocols for privacy-friendly symmetrickey authentication, which we expect will be well-suited to library RFID applications and of interest beyond RFID.  ... 
doi:10.1145/1030083.1030112 dblp:conf/ccs/MolnarW04 fatcat:4pjcmfxcnzgd3az56m54igzo4a

Security and Privacy in RFID Applications [chapter]

Pawe Rotter
2009 Development and Implementation of RFID Technology  
There are at least several examples where RFID authentication protocols, developed in laboratories of big companies, have been cracked.  ...  A specific countermeasure against replay attack is authentication of the tag e.g. with a challenge-response protocol.  ...  UHF tags for sensing applications, surface acoustic wave RFID tags, smart RFID tags), complex RFID systems, security and privacy issues in RFID applications, as well as the selection of encryption algorithms  ... 
doi:10.5772/6527 fatcat:d5dqkchcuvdf7f2e7bw7vo3ziq

A Survey of Internet of Things (IoT) Authentication Schemes

Mohammed El-hajj, Ahmad Fadlallah, Maroun Chamoun, Ahmed Serhrouchni
2019 Sensors  
This paper gives a near complete and up-to-date view of the IoT authentication field. It provides a summary of a large range of authentication protocols proposed in the literature.  ...  Using a multi-criteria classification previously introduced in our work, it compares and evaluates the proposed authentication protocols, showing their strengths and weaknesses, which constitutes a fundamental  ...  The protocol requires a user to input a password to the device each time it requires authentication.  ... 
doi:10.3390/s19051141 fatcat:sc6et2p5vneyvietpdr4gr4ena

Sensors and sensibility

J. Kumagai, S. Cherry
2004 IEEE spectrum  
NOR WILL RFID TAGS BE THE ONLY WAY to surreptitiously identify you. Soon there'll be another: through Internet Protocol addresses.  ...  It's obvious that over time our expectations about privacy shift, sometimes by a little, sometimes by a lot.  ... 
doi:10.1109/mspec.2004.1309801 fatcat:nld66xkka5apfdkd63ot5rohpq

High-Tech ID and Emerging Technologies [chapter]

Martin Meints, Mark Gasson
2009 The Future of Identity in the Information Society  
These include RFID which has more recently come to the fore of the public consciousness, Ambient Intelligence environments which offer convenience at the potential cost of privacy and human implants which  ...  in which we can strive to keep our digital information secure such as Public Key encryption and digital signatures and the evolving yet somewhat controversial role of biometrics in identification and authentication  ...  . • We believe that in order to get a privacy-friendly RFID system both the RF-subsystem and the backend system needs to provide privacy protection.  ... 
doi:10.1007/978-3-642-01820-6_4 fatcat:luryo4xkunecdaj46pbjl2vybm

A survey of IoT security threats and defenses

Hassan I. Ahmed, Abdurrahman A. Nasr, Salah Abdel-Mageid, Heba K. Aslan
2019 International Journal of Advanced Computer Research  
Keywords Internet of things (IoT), Radio frequency identification (RFID), Big data analytics, Distributed denial of services (DDoS). Hassan I.  ...  The IoT requires multi-dimensional security solutions such as confidentiality, integrity, and authentication services.  ...  RFID was originally used throughout World War II due to recognizing airplanes identify friendly foe (IFF).  ... 
doi:10.19101/ijacr.2019.940088 fatcat:wt3yxyezpvd2vcoictluggdei4

How Can IoT Improve the Life-quality of Diabetes Patients?

Anne Marit Longva, Moutaz Haddara, N. Mastorakis, V. Mladenov, A. Bulucea
2019 MATEC Web of Conferences  
The disease currently has no cure, and if the patients are not monitored and get the right treatment at the right time, it might end a patient's life.  ...  Efficient authentication algorithm is needed to ensure the security of smart RFID systems, the authentication focuses on the problem of well-behaved readers harvesting information from misbehaving tags  ...  One of the main challenges in RFID information delivery is guaranteeing security and privacy [14] .  ... 
doi:10.1051/matecconf/201929203016 fatcat:23uc7n6bwjdvpita3sq64sflay

Reducing Time Complexity in RFID Systems [chapter]

Gildas Avoine, Etienne Dysli, Philippe Oechslin
2006 Lecture Notes in Computer Science  
The reason that we cannot use well-known authentication protocols comes from the fact that such protocols do not preserve the privacy of the prover.  ...  Although these protocols fit the devices' constraints, they always suffer from a large time complexity. Existing protocols require O(n) cryptographic operations to identify one device among n.  ...  The first RFID application may have been the Royal British Air Force's "Identify Friend or Foe" system, which was used during the Second World War to identify friendly aircrafts.  ... 
doi:10.1007/11693383_20 fatcat:e2gzpputfzduzbyvscxn7vw6k4

Attacks and Defenses in Short-Range Wireless Technologies for IoT

Karim Lounis, Mohammad Zulkernine
2020 IEEE Access  
Namely, we consider Wi-Fi, Bluetooth, ZigBee, and RFID wireless communication technologies.  ...  Classical approaches are based on measuring the round trip time of the messages.  ...  If the results are similar, the RFID-reader authenticates the RFID-tag. If a mutual authentication is required, the protocol runs in reverse.  ... 
doi:10.1109/access.2020.2993553 fatcat:jtcl7llvy5crjaktwmvchlmcxa

Security Issues in Ubiquitous Computing* [chapter]

Frank Stajano
2010 Handbook of Ambient Intelligence and Smart Environments  
Subsequently, any time a reader attempts to navigate the privacy protected subtree, a special RFID blocker tag, meant to be carried by the user in her shopping bag, responds to the singulation protocol  ...  In the course of this process we develop quantitative measures of location privacy.  ... 
doi:10.1007/978-0-387-93808-0_11 fatcat:avldavvpmrgqhamk6ewpck7k7y

A Bimodal Verification Cryptosystem as a Framework against Spoofing Attacks

Christina-Angeliki Toli, Bart Preneel
2015 International Journal of Intelligent Computing Research  
Finally, a novel bimodal privacy friendly cryptosystem is suggested, able to reject such kind of attacks, presenting an anti-spoofing behavior under the cooperation between user and the function.  ...  This ePassport idea is inspired by previous works on spoofing for biometrics [4] and designs to defeat attacks through implementations of RFID authentication protocols and data encryption, increasing  ...  Additionally, cryptosystems and especially crypto-bio keys ideas for multi-modalities are not only more efficient than mono-modal ones, but simultaneously privacy friendly.  ... 
doi:10.20533/ijicr.2042.4655.2015.0069 fatcat:ifg2vnc6qbhntc755fxbihitia

Block Chain Based Internet of Medical Things for Uninterrupted, Ubiquitous, User-Friendly, Unflappable, Unblemished, Unlimited Health Care Services (BC IoMT U6 HCS)

J Indumathi, Achyut Shankar, Muhammad Rukunuddin Ghalib, J Gitanjali, Qiaozhi Hua, Zheng Wen, Xin Qi
2020 IEEE Access  
generation of blocks consumes time it demands real time and instant response, as it is life-threatening.  ...  RFID communications is affected between two entities-RFID reader (reading device) and RFID tag .  ...  Being a privacy researcher and activist, she has received many awards and accolades from the various organizations, varsities and institutions quantifying to more than 65 awards.Dr. J. Indumathi  ... 
doi:10.1109/access.2020.3040240 fatcat:mh62tubbfjeh5heb4fcfbre6ky

Authentication Protocols for Internet of Things: A Comprehensive Survey [article]

Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang
2016 arXiv   pre-print
In this paper, we present a comprehensive survey of authentication protocols for Internet of Things (IoT).  ...  Then, we review threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT.  ...  ., discussed the different measures that were needed in order to ensure the architecture's resilience to attacks, data authentication, access control and client privacy.  ... 
arXiv:1612.07206v1 fatcat:awa32vfghnhwvdzrmjh2t2r2cm
« Previous Showing results 1 — 15 out of 307 results