scispace - formally typeset
Journal ArticleDOI

Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection

Reads0
Chats0
TLDR
This paper proposes a new authentication and encryption method that conforms to the EPC Class 1 Generation 2 standards to ensure RFID security between tags and readers and proves its feasibility for use in several applications.
About
This article is published in Engineering Applications of Artificial Intelligence.The article was published on 2009-12-01. It has received 113 citations till now. The article focuses on the topics: Radio-frequency identification & Mutual authentication.

read more

Citations
More filters
Journal ArticleDOI

Internet of Things: a New Application for Intelligent Traffic Monitoring System

TL;DR: Research and design show that it is feasible and inexpensive to construct an intelligent traffic monitoring system based on Internet of Things, and the intelligent traffic monitored system has a number of advantages such low cost, high reliability, never affected by adverse weather, all weather operations etc.
Journal ArticleDOI

Improvement of the RFID authentication scheme based on quadratic residues

TL;DR: This study demonstrates that Chen et al.'s RFID authentication scheme does not provide location privacy and suffers from replay attacks, and an improved scheme is also proposed which can prevent possible attacks and be applied in environments requiring a high level of security.
Journal ArticleDOI

A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems

TL;DR: This scheme is the first quadratic residues based scheme to achieve compliance to EPC Class-1 Gen-2 specifications and achieves authentication of the tag, reader and back-end server in the RFID system and protects the privacy of the communication without the need for tags to implement expensive hash functions.
Journal ArticleDOI

RFID mutual authentication protocols

TL;DR: This work considers a stream of publications among these that consider mutual authentication of tag and reader, and identifies some existing vulnerabilities.
Journal ArticleDOI

Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography

TL;DR: This paper provides a comprehensive analysis of privacy-friendly authentication protocols devoted to RFID that are based on well-established symmetric-key cryptographic building blocks and require a reader complexity lower than O(N) where N is the number of provers in the system.
References
More filters
Proceedings ArticleDOI

The blocker tag: selective blocking of RFID tags for consumer privacy

TL;DR: This work proposes the use of "selective blocking" by "blocker tags" as a way of protecting consumers from unwanted scanning of RFID tags attached to items they may be carrying or wearing, and believes that this approach provides a very attractive alternative for addressing privacy concerns raised by the potential (and likely) widespread use ofRFID tags in consumer products.
Journal ArticleDOI

Rfid Technologies: Supply-Chain Applications and Implementation Issues

TL;DR: This publication contains reprint articles for which IEEE does not hold copyright and which are likely to be copyrighted.

Cryptographic Approach to “Privacy-Friendly” Tags

TL;DR: This paper discusses and clarifies the requirements and restrictions of RFID systems, and suggests the use of the previously proposed scheme, which protects user privacy using a low-cost hash chain mechanism.
Journal ArticleDOI

Increasing efficiency in the supply chain for short shelf life goods using RFID tagging

TL;DR: In this paper, the authors discuss the potential of utilizing RFID technology for increasing efficiency in the supply chain of short shelf life products, and analyze the potential benefits of RFID for short shelf-life products retailers and conclude that when applied with recyclable transport containers, RFID investments can provide quick amortisation of capital whilst offering a range of operational benefits.
Journal ArticleDOI

RFID privacy: an overview of problems and proposed solutions

TL;DR: In this paper, the authors highlight potential threats and how they might be addressed using both technology and public policy, and provide an overview of the potential threats in RFID-based RFID systems.
Related Papers (5)