An Improved Watermarking-Based Algorithm of Tamper Detection for Low-Cost EPC C1G2 RFID Tags

2014 ◽  
Vol 513-517 ◽  
pp. 1005-1008
Author(s):  
Xiao Ming Yao ◽  
Hong Yu Chen ◽  
Hong Lei Li ◽  
Xiao Yi Zhou

Data tampering as one of the primary security issues in RFID-enabled applications has been presented in recent years and proposals based on watermarking have been put forward to address different aspects of tampering in RFID tags. However, most of current researches are focused on the way of generating the watermark from the data to be protected and embedding it into the tag field (usually the field of serial number or SN) used as the cover medium, thus the innate structural coding relationship as a new clue to guess out the hidden watermark might be ignored. In this paper, this flaw has been fully considered, and a novel tamper detection method using CFB based encryption to hide the location clues is presented. Although it cant resist the attack from statistical analysis either, theoretical analysis has demonstrated that our scheme outperforms its previous counterparts in data security.

Author(s):  
Aisha Aseeri ◽  
Omaimah Bamasag

Purpose In the past few years, HB-like protocols have gained much attention in the field of lightweight authentication protocols due to their efficient functioning and large potential applications in low-cost radio frequency identification tags, which are on the other side spreading so fast. However, most published HB protocols are vulnerable to man-in-the-middle attacks such as GRS or OOV attacks. The purpose of this research is to investigate security issues pertaining to HB-like protocols with an aim of improving their security and efficiency. Design/methodology/approach In this paper, a new and secure variant of HB family protocols named HB-MP* is proposed and designed, using the techniques of random rotation. The security of the proposed protocol is proven using formal proofs. Also, a prototype of the protocol is implemented to check its applicability, test the security in implementation and to compare its performance with the most related protocol. Findings The HB-MP* protocol is found secure against passive and active adversaries and is implementable within the tight resource constraints of today’s EPC-type RFID tags. Accordingly, the HB-MP* protocol provides higher security than previous HB-like protocols without sacrificing performance. Originality/value This paper proposes a new HB variant called HB-MP* that tries to be immune against the pre-mentioned attacks and at the same time keeping the simple structure. It will use only lightweight operations to randomize the rotation of the secret.


Symmetry ◽  
2021 ◽  
Vol 13 (4) ◽  
pp. 678
Author(s):  
Vladimir Tadic ◽  
Tatjana Loncar-Turukalo ◽  
Akos Odry ◽  
Zeljen Trpovski ◽  
Attila Toth ◽  
...  

This note presents a fuzzy optimization of Gabor filter-based object and text detection. The derivation of a 2D Gabor filter and the guidelines for the fuzzification of the filter parameters are described. The fuzzy Gabor filter proved to be a robust text an object detection method in low-quality input images as extensively evaluated in the problem of license plate localization. The extended set of examples confirmed that the fuzzy optimized Gabor filter with adequately fuzzified parameters detected the desired license plate texture components and highly improved the object detection when compared to the classic Gabor filter. The robustness of the proposed approach was further demonstrated on other images of various origin containing text and different textures, captured using low-cost or modest quality acquisition procedures. The possibility to fine tune the fuzzification procedure to better suit certain applications offers the potential to further boost detection performance.


The Analyst ◽  
2021 ◽  
Author(s):  
Jinyuan Chen ◽  
Hongxiang Wei ◽  
Xinyu Fang ◽  
Yuanqing Cai ◽  
Zhenzhen Zhang ◽  
...  

A pragmatic electrochemical mecA gene detection method for a rapid, accurate and low-cost identification of MRSA in the joint synovial fluid of PJI patients.


2018 ◽  
Vol 34 (3) ◽  
pp. 633-645
Author(s):  
Cornel Samoilă ◽  
Doru Ursuţiu ◽  
Vlad Jinga

Abstract MOOC appearance has produced, in a first phase, more discussions than contributions. Despite pessimistic opinions or those catastrophic foreseeing the end of the classic education by accepting MOOC, the authors consider that, as it is happening in all situations when a field is reformed, instead of criticism or catastrophic predictions, an assessment should be simply made. MOOC will not be better or worse if it is discussed and dissected but can be tested in action, perfected by results, or abandoned if it has no prospects. Without testing, no decision is valid. A similarity between the MOOC appearance and the appearance of the idea of flying machines heavier than air can be made. In the flight case, the first reaction was a strong negation (including at Academies level) and only performing the first independent flight with an apparatus heavier than air has shifted orientation from denial to contributions. So, practical tests clarified the battle between ideas. The authors of this article encourage the idea of testing–assessment and, therefore, imagined and proposed one software for quickly assess whether MOOC produces changes in knowledge, by simply transferring courses from ‘face-to-face’ environment into the virtual one. Among the methods of statistical analysis for student behavioral changes was chosen the Keppel method. It underpins the assessment method of this work being approached using both the version with one variable and also with three variables. It is intended that this attempts to pave the way for other series of rapid assessment regarding MOOC effects (using other statistical methods). We believe, that this is the only approach that can lead either to improve the system or to renunciation.


2012 ◽  
Vol 2012 ◽  
pp. 1-11 ◽  
Author(s):  
Yinan Yu ◽  
Jian Yang ◽  
Tomas McKelvey ◽  
Borys Stoew

Ultrawideband (UWB) technology has many advantages compared to its narrowband counterpart in many applications. We present a new compact low-cost UWB radar for indoor and through-wall scenario. The focus of the paper is on the development of the signal processing algorithms for ranging and tracking, taking into account the particular properties of the UWB CMOS transceiver and the radiation characteristics of the antennas. Theoretical analysis for the algorithms and their evaluations by measurements are presented in the paper. The ranging resolution of this UWB radar has achieved 1-2 mm RMS accuracy for a moving target in indoor environment over a short range, and Kalman tracking algorithm functions well for the through-wall detection.


2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Secure and efficient authentication mechanism becomes a major concern in cloud computing due to the data sharing among cloud server and user through internet. This paper proposed an efficient Hashing, Encryption and Chebyshev HEC-based authentication in order to provide security among data communication. With the formal and the informal security analysis, it has been demonstrated that the proposed HEC-based authentication approach provides data security more efficiently in cloud. The proposed approach amplifies the security issues and ensures the privacy and data security to the cloud user. Moreover, the proposed HEC-based authentication approach makes the system more robust and secured and has been verified with multiple scenarios. However, the proposed authentication approach requires less computational time and memory than the existing authentication techniques. The performance revealed by the proposed HEC-based authentication approach is measured in terms of computation time and memory as 26ms, and 1878bytes for 100Kb data size, respectively.


Sign in / Sign up

Export Citation Format

Share Document