February 2013
Journal of Theoretical & Applied Information Technology;2/10/2013, Vol. 48 Issue 1, p359
Academic Journal
Internet of Things (IoT) is the evolution of related technologies and applications such as Internet and mobile networks. Future research into IoT will focus on generic technology, information security, and critical applications. Based on IoT, the existing RFID system security mechanisms are analyzed, with a focus on cryptographic protocols. Investigate the weaknesses or flaws in these protocols, and then a theoretical model and method to design and analyze RFID protocols within the provable security framework is discussed. A mutual authentication protocol of RFID system using synchronized secret information is put forward..


Related Articles

  • Efficient mutual authentication protocol for radiofrequency identification systems. Morshed, Md. M.; Atkins, A.; Yu, H. // IET Communications;2012, Vol. 6 Issue 16, p2715 

    The radio frequency identification (RFID) technology is expected to play a vital role in identifying objects and serving to prevent counterfeiting and fraud. The use of RFID tags may cause privacy violation of users carrying an RFID tag. Owing to the unique identification number of the RFID tag,...

  • MAP: Towards Authentication for Multiple Tags. Qingsong Yao; Jinsong Han; Saiyu Qi; Zhuo Liu; Shan Chang; Jianfeng Ma // International Journal of Distributed Sensor Networks;2013, p1 

    The prevalence of Radio Frequency Identification (RFID) technology requires Privacy-Preserving Authentication (PPA) protocols to prevent privacy leakage during authentication. Existing PPA protocols employ the per-tag authentication, in which the reader has to sequentially authenticate the tags...

  • A Hash Function-Based RFID Authentication Protocol. Minghui Wang; Junhua Pan // International Review on Computers & Software;Jan2013, Vol. 8 Issue 1, p186 

    The Radio Frequency Identification (RFID) is an automatic identification system, which is widely used for industrial and individual applications. Evolvement and benefits of RFID technology signifies that it can be low-cost, efficient and secured solution to many pervasive applications. However,...

  • Traceability Attack Algorithm on EOHLCAP RFID Authentication Protocol. Xiuqing Chen; Tianjie Cao; Mingxiang Zhu; Wenzhuo Liu; Yu Guo // Journal of Computers;Apr2014, Vol. 9 Issue 4, p938 

    We analyze a recent RFID lightweight authentication protocol, namely EOHLCAP scheme. Based on our analysis, however, a new traceability attack algorithm makes the scheme insecurity, if the attacker has the ability to distinguish the target tag. Some lightweight authentication protocols are...

  • A Mutual RFID Security Protocol for Wireless Reader. He Jialiang; Xu Zhiqiang // International Journal of Security & Its Applications;Sep2013, Vol. 7 Issue 5, p43 

    Wireless readers are used more and more widespread recently, it brings higher design requirements for RFID protocols. In this paper, a mutual RFID authentication protocol for wireless reader that can meet lightweight encryption function structure protection is proposed, this protocol only...

  • Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. Farash, Mohammad // Journal of Supercomputing;Nov2014, Vol. 70 Issue 2, p987 

    Radio frequency identification (RFID) is a wireless technology for automatic identification and data capture. Security and privacy issues in the RFID systems have attracted much attention. Many approaches have been proposed to achieve the security and privacy goals. One of these approaches is...

  • An Efficient Offline Delegation Protocol in Mobile RFID Environment. Jia-Ning Luo; Ming-Hour Yang // Journal of Networks;May2014, Vol. 9 Issue 5, p1114 

    In this paper, we propose a new protocol to allow delegation transfer between offline mobile readers in the mobile RFID (Radio Frequency Identification) environment. A mobile reader can grant the access rights of a specific tag to another reader. Besides, our protocol is efficient and secure...

  • Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Fan, Kai; Gong, Yuanyuan; Liang, Chen; Li, Hui; Yang, Yintang // Security & Communication Networks;11/10/2016, Vol. 9 Issue 16, p3095 

    As one of the core techniques in 5G, the Internet of Things is more interested than ever. Furthermore, radio frequency identification (RFID) plays a crucial role in Internet of Things development. Although the low-cost RFID system has wide prospect, it has to face with huge challenges because of...

  • Gröbner Basis Attacks on Lightweight RFID Authentication Protocols. Han, Daewan // Journal of Information Processing Systems;Dec2011, Vol. 7 Issue 4, p691 

    Since security and privacy problems in RFID systems have attracted much attention, numerous RFID authentication protocols have been suggested. One of the various design approaches is to use light-weight logics such as bitwise Boolean operations and addition modulo 2m between m-bits words....


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics