Research on Multiple Security Authentication Protocol in RFID System

2013 ◽  
Vol 457-458 ◽  
pp. 770-773
Author(s):  
Hui Xia

Weak security of RFID system is concerned by more and more people because of the fast development of internet of things. Some existing RFID authentications protocols begin to be analyzed, such as Mutual three-pass authentication, randomized Hash-Lock, which has some problem of being difficult to resist a variety of network attacks such as forgery tag attacks and a new bidirectional security authentication protocol,A multiple security authentication protocol is proposed to overcome the disadvantage of being vulnerable to cyber attacks. Analysis shows that this approach is of good security and privacy, low cost, and high efficiency.

2013 ◽  
Vol 336-338 ◽  
pp. 1882-1886
Author(s):  
Tian Fu ◽  
Zhen Wang ◽  
Pan Deng Yang

With the gradual application of RFID technology, the problems of privacy security arouse people's great attention. To address the problems of the existing RFID authentication protocol, such as the weakness on security and privacy, the high cost and the un-stabilizing systems performance, this paper puts forward a kind effective protection of privacy and low cost RFID security authentication protocol, analyses the security and performance of this protocol. This protocol can not only effectively solve the problems of replay attacks, location privacy attack and data synchronization, but also greatly use the Reader computing resources to reduce the cost of system construction, so it is appropriate for the application of RFID system.


2012 ◽  
Vol 6-7 ◽  
pp. 1072-1077 ◽  
Author(s):  
Gui Chao Wang ◽  
Ai Li Zhang ◽  
Yong Zhen Li

The security and privacy problem of low-cost RFID system is one of the most difficult conundrums in the RFID research field. A protocol based on access control was proposed in this paper, which used the reader access, partial ID, XOR operation, etc. By using of the reader authority distribution method, the unauthorized tag`s information was prevented give-away and it can avoid the lawful reader attack, location privacy attack, etc. Function of the reader was fully used. At the same time, the back-end database`s load and the time of the tag`s answer were reduced. Compared with several traditional security authentication protocols, this protocol is more security, lower energy consumption and more suitable for low-cost RFID system.


2013 ◽  
Vol 765-767 ◽  
pp. 1726-1729
Author(s):  
Yan Bing Liu ◽  
Wen Jing Ren

Security and privacy is always the most important issues by the public in the Internet of Things. The core problems are associated with the diversifying of the Internet towards an Internet of things, and the different requirements to the security level for application. Therefore, this paper is to put forward an authentication model and protocol to cope with the problem. The protocol is adopted with attribute-based encryption to replace the traditional identity-based encryption (IBE), and then make formalization analysis to the security of the protocol by using BAN logic.


Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2784 ◽  
Author(s):  
Chao Qu ◽  
Ming Tao ◽  
Ruifen Yuan

With the fast development and expansion of the Internet of Things (IoT), billions of smart devices are being continuously connected, and smart homes, as a typical IoT application, are providing people with various convenient applications, but face security and privacy issues. The idea of Blockchain (BC) theory has brought about a potential solution to the IoT security problem. The emergence of blockchain technology has brought about a change of decentralized management, providing an effective solution for the protection of network security and privacy. On the other hand, the smart devices in IoT are always lightweight and have less energy and memory. This makes the application of blockchain difficult. Against this background, this paper proposes a blockchain model based on hypergraphs. The aims of this model are to reduce the storage consumption and to solve the additional security issues. In the model, we use the hyperedge as the organization of storage nodes and convert the entire networked data storage into part network storage. We discuss the design of the model and security strategy in detail, introducing some use cases in a smart home network and evaluating the storage performance of the model through simulation experiments and an evaluation of the network.


2011 ◽  
Vol 1323 ◽  
Author(s):  
Boris Gilman ◽  
Igor Altman

ABSTRACTFor successful implementation of the nanomaterial-based PV and Energy storage devices there is a need for well-structured nano films consisting of a strictly controlled sequence of nanoparticle layers. Most promising nano-films include a “built-in” gradient of a nanoparticle size and/or material composition across the part or entire thickness of the film. Such Gradient Multilayer (GML) nano films will be able to significantly improve a PV efficiency of the 3rd generation Solar Cells and Energy storage devices. The development of GML-based devices is presently limited by lack of simple, inexpensive, scalable, and production-worthy deposition methods that are capable of forming GML nano-film on PV-suitable substrates such as flexible materials.The proposed concept describes novel principles of an advanced non-conventional deposition of the highly efficient GML nano films.The proposed GML deposition method is based on the phenomena of Flying Particles (FP). According to the FP-methods a pre-selected mix of nanoparticles (NP) of various size and/or material composition is deposited on a flexible (or other) substrate in a pre-defined order of NP size and/or composition thus forming GML nano film. Deposited GML film comprises a sequence of size-tuned and/or composition-tuned NP layers, which has a potential for significant increase of PV efficiency.The deposition process includes the NPs launch and flight through a resistant gas ambient. Due to the Stokes aerodynamic laws the FP times-to-target will be different for NP of a different size and/or density (material composition). Simulation is presented to confirm the separation of FP”s of a different size and/or density during their motion through the low-pressure gas. The calculations have been made for the initial stages of the FP process thus establishing the most efficient parameters of the process. Resultant GML nano films are expected to have superior qualities, particularly for building high efficiency / low cost PV panels. The FP-method allows for a fast development and easy implementation in PV manufacturing.


2013 ◽  
Vol 427-429 ◽  
pp. 2403-2407
Author(s):  
She Qiang Peng ◽  
Long Wang

To address the security problems caused by the fake readers, and the weakness of low authentication protocol efficiency, a new RFID security authentication protocol based on Hash function is proposed. The security ability of the protocol is compared with other protocols' and is proved by doing the formal analysis. The theoretical analysis and formal proof is presented to prove the security ability of the protocol. Consequently, the result showed that the new protocol could protect the data privacy, achieve the data synchronization, prevent the tag from location tracking, avoid information reproduction, prevent clone and counterfeit and possess forward security ability which was useful for low-cost tags.


2014 ◽  
Vol 14 (2) ◽  
pp. 5487-5493
Author(s):  
Vaishali Hirlekar

There are a continuously growing number of customers who use Online Transaction facility due to its convenience. But the security and privacy of Information may be one of the biggest concerns to the users. In face of the current security issues and the growing number of attacks and consequent frauds, new systems should be designed as to provide better authentication and identification methods. A generic and secure framework is proposed to upgrade two-factor authentication to three-factor authentication. A well designed three-factor authentication protocol authentication system can greatly improve the information assurance at low cost. In three-factor authentication, in addition to furnishing their regular password and an OTP, users will be asked to provide biometric information would irrefutably prove their identity. This fingerprint biometric information can be captured by using low cost sensors such as Web Cam. In this paper, we investigate new technique to suitably process camera images of fingertips in order to produce image which are as similar as possible to the ones coming from dedicated sensors. The proposed technique encompasses a segmentation, enhancement and matching of the fingertip image for the person's identifiaction.


Author(s):  
Arnab Mitra ◽  
Sayantan Saha

A lightweight data security model is of much importance in view of security and privacy of data in several networks (e.g., fog networks) where available computing units at edge nodes are often constrained with low computing capacity and limited storage/availability of energy. To facilitate lightweight data security at such constrained scenarios, cellular automata (CA)-based lightweight data security model is presented in this chapter to enable low-cost physical implementation. For this reason, a detailed investigation is presented in this chapter to explore the potential capabilities of CA-based scheme towards the design of lightweight data security model. Further, a comparison among several existing lightweight data security models ensure the effectiveness for proposed CA-based lightweight data security model. Thus, application suitability in view of fog networks is explored for the proposed CA-based model which has further potential for easy training of a reservoir of computers towards uses in IoT (internet of things)-based multiple industry applications.


2013 ◽  
Vol 416-417 ◽  
pp. 2055-2058
Author(s):  
Yuan Chen

We discuss the application of internet of things (IOT) in the management of urban infrastructure and study critical technology in IOT. As an important component and critical technology in IOT, radio frequency identification (RFID) system provides an effective method to detect, monitor or control the object and is composed of tag, reader and antenna. At last we design a compact microstrip antenna with low cost and small weight for a RFID system in IOT which can also be used in narrow-band wireless communication.


Sign in / Sign up

Export Citation Format

Share Document