An Improvement on Randomly Changed Identification Protocol for Low-Cost Tags

2012 ◽  
Vol 562-564 ◽  
pp. 1583-1589
Author(s):  
Xiao Xia Tao ◽  
Hong Yang ◽  
Rong Chen ◽  
Zhen Jun Du

With the benefits to improve productivity and reduce operation cost, RFID (Radio Frequency Identification) has recently seen a great increase in a wide variety of business information systems. However, the downside in business applications is the problem caused by data security and privacy. Enhancement without extra costs in RFID identification poses new challenges to privacy and security in RFID-driven just-in-time business information systems. In this paper, we propose an unilateral randomly authentication protocol on the basis of one-way hash function for low-cost RFID tags. We illustrate the whole operating procedure of the proposed protocol in a typical RFID system. Experimental results show that the proposed protocol has some security improvements in data consistency and can work against some attacks like eavesdropping and DoS, compared with several existing methods.

2021 ◽  
Author(s):  
Xiaohui Yu

As Radio Frequency Identification (RFID) technology achieves commercial success, its privacy and security issues are becoming a barrier to limit its potential for future start of the art applications. In this report, we present an investigation of the past and current research related to RFID security algorithms and protocols for product authentication. We also present a novel RFID security protocol based on eXtended Tiny Encryption Algorithm (XTEA). Analysis of the security and privacy level of our proposed protocol is performed using SystemC based modeling and different attack models are simulated to show that the protocol is robust and safe against application, protoypes of these attack models are implemented on FPGA platform. We also compare our proposed protocol technique with similar protocols presented in the near past that also use symmetric key algorithms to verify and demostrate main advantages of our protocol in terms of security and performance.


Author(s):  
Kamalendu Pal

The advent of Radio Frequency Identification (RFID) technique, low-cost wireless sensor devices, and web-based technologies are ushering new ways to take control of the plethora of data created by the Internet of Things (IoT) approach has gained popularity in the modern manufacturing industry. This mechanism provides an opportunity of remotely storing and retrieving data from RFID-tags. Products labelled with such tags can be scanned efficiently using RFID-readers that do not require line-of-sight. This type of identification and access to information on tags are used by manufacturing business operations, can lead to improving logistics, and better customer service. However, the widespread use of RFID technology also introduces serious security and privacy risks since the information stored in tags can easily be retrieved by hidden RFID-readers, eventually leading to the violation of genuine business operation privacy. This chapter discusses the open research challenges of RFID applications in the manufacturing supply chain operations.


2021 ◽  
Author(s):  
Xiaohui Yu

As Radio Frequency Identification (RFID) technology achieves commercial success, its privacy and security issues are becoming a barrier to limit its potential for future start of the art applications. In this report, we present an investigation of the past and current research related to RFID security algorithms and protocols for product authentication. We also present a novel RFID security protocol based on eXtended Tiny Encryption Algorithm (XTEA). Analysis of the security and privacy level of our proposed protocol is performed using SystemC based modeling and different attack models are simulated to show that the protocol is robust and safe against application, protoypes of these attack models are implemented on FPGA platform. We also compare our proposed protocol technique with similar protocols presented in the near past that also use symmetric key algorithms to verify and demostrate main advantages of our protocol in terms of security and performance.


2015 ◽  
Vol 2 (2) ◽  
pp. 86-96 ◽  
Author(s):  
M. Zomorrodi ◽  
N.C. Karmakar

The electromagnetic (EM) imaging technique at mm-band 60 GHz is proposed for data encoding purpose in the chipless Radio Frequency Identification (RFID) systems. The fully printable chipless RFID tag comprises tiny conductive EM polarizers to create high cross-polar radar cross-section. Synthetic aperture radar approach is applied for formation of the tag's EM-image and revealing the tag's content. The achieved high data encoding capacity of 2 bits/cm2in this technique based on a fully printable tag is very convincing for many applications. The system immunity to multipath interference, bending effect, and printing inaccuracy suggests huge potentials for low-cost item tagging. Tags are also readable through a tick paper envelop; hence secure identification is provided by the proposed technique.


Sign in / Sign up

Export Citation Format

Share Document