Journal ArticleDOI
Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection
Chin-Ling Chen,Yong-Yuan Deng +1 more
Reads0
Chats0
TLDR
This paper proposes a new authentication and encryption method that conforms to the EPC Class 1 Generation 2 standards to ensure RFID security between tags and readers and proves its feasibility for use in several applications.About:
This article is published in Engineering Applications of Artificial Intelligence.The article was published on 2009-12-01. It has received 113 citations till now. The article focuses on the topics: Radio-frequency identification & Mutual authentication.read more
Citations
More filters
Journal ArticleDOI
Internet of Things: a New Application for Intelligent Traffic Monitoring System
Laisheng Xiao,Zheng xia Wang +1 more
TL;DR: Research and design show that it is feasible and inexpensive to construct an intelligent traffic monitoring system based on Internet of Things, and the intelligent traffic monitored system has a number of advantages such low cost, high reliability, never affected by adverse weather, all weather operations etc.
Journal ArticleDOI
Improvement of the RFID authentication scheme based on quadratic residues
TL;DR: This study demonstrates that Chen et al.'s RFID authentication scheme does not provide location privacy and suffers from replay attacks, and an improved scheme is also proposed which can prevent possible attacks and be applied in environments requiring a high level of security.
Journal ArticleDOI
A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems
TL;DR: This scheme is the first quadratic residues based scheme to achieve compliance to EPC Class-1 Gen-2 specifications and achieves authentication of the tag, reader and back-end server in the RFID system and protects the privacy of the communication without the need for tags to implement expensive hash functions.
Journal ArticleDOI
RFID mutual authentication protocols
TL;DR: This work considers a stream of publications among these that consider mutual authentication of tag and reader, and identifies some existing vulnerabilities.
Journal ArticleDOI
Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography
TL;DR: This paper provides a comprehensive analysis of privacy-friendly authentication protocols devoted to RFID that are based on well-established symmetric-key cryptographic building blocks and require a reader complexity lower than O(N) where N is the number of provers in the system.
References
More filters
Proceedings ArticleDOI
The blocker tag: selective blocking of RFID tags for consumer privacy
TL;DR: This work proposes the use of "selective blocking" by "blocker tags" as a way of protecting consumers from unwanted scanning of RFID tags attached to items they may be carrying or wearing, and believes that this approach provides a very attractive alternative for addressing privacy concerns raised by the potential (and likely) widespread use ofRFID tags in consumer products.
Journal ArticleDOI
Rfid Technologies: Supply-Chain Applications and Implementation Issues
TL;DR: This publication contains reprint articles for which IEEE does not hold copyright and which are likely to be copyrighted.
Cryptographic Approach to “Privacy-Friendly” Tags
TL;DR: This paper discusses and clarifies the requirements and restrictions of RFID systems, and suggests the use of the previously proposed scheme, which protects user privacy using a low-cost hash chain mechanism.
Journal ArticleDOI
Increasing efficiency in the supply chain for short shelf life goods using RFID tagging
TL;DR: In this paper, the authors discuss the potential of utilizing RFID technology for increasing efficiency in the supply chain of short shelf life products, and analyze the potential benefits of RFID for short shelf-life products retailers and conclude that when applied with recyclable transport containers, RFID investments can provide quick amortisation of capital whilst offering a range of operational benefits.
Journal ArticleDOI
RFID privacy: an overview of problems and proposed solutions
TL;DR: In this paper, the authors highlight potential threats and how they might be addressed using both technology and public policy, and provide an overview of the potential threats in RFID-based RFID systems.
Related Papers (5)
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Hung-Yu Chien,Che-Hao Chen +1 more