Academic literature on the topic 'Radio frequency identification systems Security measures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Radio frequency identification systems Security measures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Radio frequency identification systems Security measures"
Kang, Jian, Hui Mu, Hui Ren, Jicheng Jia, Lin Qi, and Zherui Zhang. "Electromagnetic Signal Intelligent Identification Based on Radio Frequency Fingerprints." Wireless Communications and Mobile Computing 2022 (June 7, 2022): 1–12. http://dx.doi.org/10.1155/2022/6296954.
Full textLamrani Alaoui, Hasnae, Abdellatif El Ghazi, Mustapha Zbakh, Abdellah Touhafi, and An Braeken. "A Highly Efficient ECC-Based Authentication Protocol for RFID." Journal of Sensors 2021 (July 3, 2021): 1–16. http://dx.doi.org/10.1155/2021/8876766.
Full textRuhil, Ankit, Dr Manjot Kaur Bhatia, and Pooja kumari. "SLIM: A Lightweight Block Cipher for Internet of Health Things." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 370–81. http://dx.doi.org/10.22214/ijraset.2022.47879.
Full textWei, Guo-heng, Yan-lin Qin, and Wei Fu. "An Improved Security Authentication Protocol for Lightweight RFID Based on ECC." Journal of Sensors 2022 (February 8, 2022): 1–6. http://dx.doi.org/10.1155/2022/7516010.
Full textDeMers, Gerard, Christopher Kahn, Per Johansson, Colleen Buono, Octav Chipara, William Griswold, and Theodore Chan. "Secure Scalable Disaster Electronic Medical Record and Tracking System." Prehospital and Disaster Medicine 28, no. 5 (June 26, 2013): 498–501. http://dx.doi.org/10.1017/s1049023x13008686.
Full textGvozdenovic, Nikola, Ralph Prestros, and Christoph F. Mecklenbräuker. "Far-Field Testing Method of Spurious Emission Produced by HF RFID." International Journal of Antennas and Propagation 2016 (2016): 1–6. http://dx.doi.org/10.1155/2016/4715898.
Full textOgurtsov, Maxim, Vyacheslav Korolyov, and Oleksandr Khodzinskyi. "To the Problems of the National State Recognition System Improving." Cybernetics and Computer Technologies, no. 2 (September 30, 2022): 74–82. http://dx.doi.org/10.34229/2707-451x.22.2.8.
Full textEl Khamlichi, Mohamed, Alejandro Alvarez Melcon, Otman El Mrabet, Mohammed Ali Ennasar, and Juan Hinojosa. "Flexible UHF RFID Tag for Blood Tubes Monitoring." Sensors 19, no. 22 (November 9, 2019): 4903. http://dx.doi.org/10.3390/s19224903.
Full textAndziulis, Arūnas, Rimantas Plėštys, Sergej Jakovlev, Danielius Adomaitis, Konstantin Gerasimov, Mindaugas Kurmis, and Valdemaras Pareigis. "PRIORITY BASED TAG AUTHENTICATION AND ROUTING ALGORITHM FOR INTERMODAL CONTAINERS RFID SENSOR NETWORK." TRANSPORT 27, no. 4 (December 21, 2012): 373–82. http://dx.doi.org/10.3846/16484142.2012.750622.
Full textLv, Hao, Teng Jiao, Yang Zhang, Fulai Liang, Fugui Qi, and Jianqi Wang. "A Novel Method for Breath Detection via Stepped-Frequency Continuous Wave Ultra-Wideband (SFCW UWB) Radars Based on Operational Bandwidth Segmentation." Sensors 18, no. 11 (November 10, 2018): 3873. http://dx.doi.org/10.3390/s18113873.
Full textDissertations / Theses on the topic "Radio frequency identification systems Security measures"
Foley, Joseph Timothy 1976. "Security approaches for Radio Frequency Identification systems." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/38710.
Full textIncludes bibliographical references (p. 253-270) and index.
In this thesis, I explore the challenges related to the security of the Electronic Product Code (EPC) class of Radio Frequency Identification (RFID) tags and associated data. RFID systems can be used to improve supply chain performance and automate asset management. However, an antagonist could use the functionality of the RFID tags and the EPC data to invade personal privacy or acquire access to unauthorized corporate information such as inventory levels. In addition, current RFID mechanisms expose secrets to the readers, which opens an avenue for exploits and information leakage. I examined the RFID security and privacy issues and designed a number of systems to improve tag authentication, privacy protection, and secure sharing of EPC data. The specific solutions I propose include TagCheck to protect tags from counterfeiting, JanusTag to allow recoverable dynamic recoding of tags, TagFolio for privacy policy enforcement, and TagDirective for secret management and access control. To prevent leakage at the application level during Object Name System (ONS) resolution, I propose the use of an anonymizing TorONS system.
(cont.) Lastly, to protect tags from being "mass killed", I designed two different categories of RFID tag kill-resistance mechanisms: active protection using Neighborhood Watch communities of readers and Exponential Rampup for tag self-defense. These technologies are combined under one umbrella called TinFoil, creating a comprehensive security solution that successfully protects the data in an EPC-enabled RFID system while minimizing required modifications to existing architecture.
by Joseph Timothy Foley.
S.M.
Xu, Dongming. "On the testing of the RFID security /." View abstract or full-text, 2009. http://library.ust.hk/cgi/db/thesis.pl?CSED%202009%20XU.
Full textYassaei, Mahshid. "Security and privacy analysis of radio frequency identification systems." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=114506.
Full textLes technologies de radio identification (RFID) sont fortement utilisées dans diverses applications qui vont du contrôle d'accès aux systèmes de traçabilité d'objets. L'automatisation et la rapidité accrue des services que ces technologies rendent possibles ont des effets marqués sur notre vie quotidienne. Cependant, les systèmes RFID comportent de nombreux problèmes de sécurité et de protection de la vie privée qui ne sont toujours pas résolus. Au cours des dernières années, de nombreuses attaques ont été conues contre la puce Classic de MIFARE ainsi que la puce iClass d'HID, deux des systèmes RFID les plus répandus sur le marché. Le but de cette étude est d'améliorer les mécanismes de sécurité et de protection de la vie privée des systèmes RFID par le développement d'outils et la méthodologie d'analyse des systèmes, dans l'espoir de découvrir les failles de sécurité potentielles avant que des adversaires ne le fassent. Par exemple, nous avons procédé à une analyse partielle des cartes OPUS (les cartes qui contiennent les titres de transport en commun utilisés à Montréal, qui font usage de la technologie RFID), et mis en évidence de nombreux éléments des spécifications de ces cartes qui représentent une faille de sécurité ou de protection de la vie privée. Nous avons découvert que le numéro d'identification statique de la carte est transmis durant le processus anticollision, ce qui peut être utilisé pour suivre la trace du détenteur de la carte sans son consentement. De plus, des informations concernant les trois dernières utilisations d'une carte (l'heure, la date, et la station de métro ou d'autobus) sont transmis sans être chiffrés, et avant le processus d'authentification n'ait lieu. Seule une conversion linéaire est appliquée sur l'information, et cette conversion peut être inversée par une simple application telle que celle que nous avons développé au cours de cette étude. De plus, nous présentons des modifications visant à améliorer le niveau de sécurité et de protection de la vie privée des systèmes RFID. Nous classons ces modifications sur la base de leur coût et de la gravité des interruptions de service que l'application de ces modifications ferait subir au manufacturier.Mots clés: Systèmes RFID, protection de la vie privée, sécurité, cartes OPUS
Schlesinger, Adam Ian. "Mitigating container security risk using real-time monitoring with active Radio Frequency Identification and sensors." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33353.
Full textIncludes bibliographical references (leaves 57-60).
The global village in which we live enables increased trade and commerce across regions but also brings a complicated new set of challenges such as terrorist activity, human and drug smuggling and theft in foreign or domestic locations. Containers travel the globe, across all seven continents. In the wake of intensified security concerns since the September 11, 2001 attacks, tracking containers and their contents presents an increasing concern for those institutions and personnel charged with ensuring their security. This thesis analyzes the risks associated with global container transport. The concept of an e-container is set forth as a risk mitigation technology that uses real-time monitoring of a container's physical status acquired from an array of embedded RFID-enabled sensors. A framework is suggested that relates sensor-identified signatures and phenomena to behaviors representing breaches in container security. A theoretical model suggests which sensors are required to identify the individual breaches in order to mitigate container security risk.
y Adam Ian Schlesinger.
M.Eng.in Logistics
Sakai, Kazuya. "Security and Privacy in Large-Scale RFID Systems." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1386006971.
Full textBitko, Gordon. "RFID in the retail sector a methodology for analysis of policy proposals and their implications for privacy, economic efficiency and security /." Santa Monica, CA : RAND, 2007. http://www.rand.org/pubs/rgsd_issertations/RGSD209/.
Full textMogiba, Ntombizandile Cynthia. "Utilising radio-frequency identification technologies as knowledge management enablers in academic libraries: a case study of the University of South Africa." Diss., 2018. http://hdl.handle.net/10500/25322.
Full textInformation Science
M. Inf. (Information Science)
Ranasinghe, Damith Chinthana. "New directions in advanced RFID systems." 2007. http://hdl.handle.net/2440/58490.
Full textA combination of Radio Frequency Identification technology and ubiquitous computing are revolutionising the manner in which we look at simple objects. Radio Frequency Identification (RFID) allows RFID labeled objects to be identified at a distance without physical contact, and ubiquitous computing provides a virtually connected environment for the objects. RFID labels are frequently referred to as the next generation barcodes. RFID Systems provide increased productivity, efficiency, convenience and many advantages over bar codes for numerous applications, especially global supply chain management. RFID labeling has a number of advantages over conventional bar code systems. The optics based bar code systems could be rendered useless by common everyday environments containing dirt, dust, smoke, grease, condensation and by misorientation and misalignment. Furthermore bar codes are subject to fraudulent duplication and counterfeiting with minimal effort. However, there are limitations and constraints inherent to RFID technology: semiconductor thresholds, limits on transmitted power, costs, antenna and coupling inefficiencies. Thus it is important for RFID designers to understand these limitations and constraints in order to optimise system designs and overcome inefficiencies where possible. Therefore the work presented in this dissertation seeks to improve the performance of advanced RFID systems by overcoming a number of these limitations. Prior to a discussion of improving performance, the author's interpretation of a modem RFID system along its evolutionary path as a ubiquitous RFID network and its application to supply chain management is described. Performance improvements are achieved by: the development of electromagnetic theory for RFID system analysis and optimisation; design and development of interrogator antennas; analysis of electrically small and tiny antennas for RFID labels; and development and utilisation of a design methodology for creating high performance label antennas and antennas for tagging metallic objects. Implementations of RFID systems have raised concerns regarding information security and possible violations of end-user privacy. The most profound concerns are raised against low cost RFID technology because of its potential for mass scale deployment, its pervasive nature, and the resource limitations preventing the provision of strong cryptographic solutions. There is a growing need in the RFID community to discover and develop techniques and methods to overcome various hurdles posed by the above-mentioned concerns. Thus, the thesis also considers the vulnerabilities of low cost RFID systems and associated insecurities and privacy concerns resulting from the latter. Prior to addressing such concerns impeding the deployment of low cost RFID technology, a framework within which to provide security services is also detailed. It has become important to both defme and identity a framework based around low cost RFID systems since RFID has become a "catch all" phrase for various other forms of technology. Addressing security and privacy of low cost RFID systems requires novel thinking. The later parts of the thesis outline design considerations for security mechanisms and a number of practicable solutions for providing the features of: mutual authentication; confidentiality; message content security; product authentication; anonymity and untraceability, that are necessary for low cost RFID systems to overcome the weaknesses identified in this dissertation. Implementing these security mechanisms requires the generation of true random tag parameters and true random numbers. Achieving these objectives using a hardware based true random number generator is also described and analysed. A final part of the thesis focuses on active RFID labels and improving their performance. The primary concern with active labels is the life of the onboard battery. Turn-on circuits provide a method of turning "on" and "off" an active label remotely to conserve valuable battery power. Analysis, development and testing of a turn-on circuit concept, based on interrogator field sensing, have provided a means of remotely activating and deactivating active RFID labels and conserving battery power. The final chapter of this thesis provides a detailed analysis, based on coupling relations between electromechanical systems, for evaluating the feasibility of a theft detection sensor, based on a turn-on circuit for an active RFID label, for preventing the theft of high value items. While low cost RFID needs to overcome certain security and privacy related barriers, RFID technology does provide novel and valid approaches to such security related applications as product authentication, anti-counterfeiting and theft detection. It is believed that the contributions from this thesis will extend and elaborate on the existing knowledge base, paving the way forward to allow further significant deployment of advanced RFID techno logy.
http://proxy.library.adelaide.edu.au/login?url= http://library.adelaide.edu.au/cgi-bin/Pwebrecon.cgi?BBID=1368084
Thesis (Ph.D.) -- University of Adelaide, School of Electrical and Electronic Engineering, 2007
Muwanguzi, Mark. "Security framework for low cost RFID tags." Thesis, 2010. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000289.
Full textRadio Frequency Identification (RFID) systems are becoming more popular today, especially in first world countries. This is a result of the systems wide range of applications. RFID technology is used in several industries, such as: transport, sport, medicine and government institutions. The advantages that the technology offers promote its widespread use and implementation in various industries. RFID systems have the capacity to store more information than other identification technologies (for example barcode technology). Data can be read with ease as it does not require line of sight and human intervention. Despite several implementations in many industries, RFID still has some disadvantages, for instance implementation cost and issues of security and privacy. The focus of this study is the security and privacy issues in the RFID environment.
Mullani, Ally Aziz Jamal. "A strategic assessment of the challenges involved in entering the cargo containers tracking and security market for an RFID company /." 2005. http://ir.lib.sfu.ca/handle/1892/3644.
Full textBooks on the topic "Radio frequency identification systems Security measures"
China) RFIDSec (Workshop) (2013 Guangzhou. Radio frequency identification system security: RFIDsec'13 Asia Workshop Proceedings. Amsterdam, Netherlands: IOS Press, 2013.
Find full textSingapore), Workshop on RFID Security (2010. Radio frequency identification system security: RFIDsec'10 Asia Workshop proceedings. Amsterdam: IOS Press, 2010.
Find full textRFIDsec '11 Asia (2011 Wuxi Shi, China). Radio frequency identification system security: RFIDsec '11 Asia Workshop proceedings. Amsterdam: IOS Press, 2011.
Find full textZhang, Yan. Security in RFID and sensor networks. Boca Raton: Auerbach Publications, 2009.
Find full textMaking the most of RFID in libraries. London: Facet Pub., 2009.
Find full textAdvanced security and privacy for RFID technologies. Hershey, PA: Information Science Reference, 2013.
Find full textUnited, States Congress House Committee on Energy and Commerce Subcommittee on Commerce Trade and Consumer Protection. RFID technology: What the future holds for commerce, security, and the consumer : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Eighth Congress, second session, July 14, 2004. Washington: U.S. G.P.O., 2004.
Find full textTu shu guan RFID yan jiu: A study on RFID application in libraries. Beijing Shi: Guo jia tu shu guan, 2010.
Find full textPalmer, Martin. Making the most of RFID in libraries. London: Facet Pub., 2009.
Find full textLopez, Pedro Peris, Julio C. Hernandez-Castro, and Tieyan Li. Security and trends in wireless identification and sensing platform tags: Advancements in RFID. Hershey, PA: Information Science Reference, 2013.
Find full textBook chapters on the topic "Radio frequency identification systems Security measures"
Armknecht, Frederik, Liqun Chen, Ahmad-Reza Sadeghi, and Christian Wachsmann. "Anonymous Authentication for RFID Systems." In Radio Frequency Identification: Security and Privacy Issues, 158–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16822-2_14.
Full textKlonowski, Marek, Krzysztof Majcher, Wojciech Macyna, and Filip Zagórski. "Hidden Bits Approach for Authentication in RFID Systems." In Radio Frequency Identification. Security and Privacy Issues, 48–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36140-1_4.
Full textHinterwälder, Gesine, Christof Paar, and Wayne P. Burleson. "Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems." In Radio Frequency Identification. Security and Privacy Issues, 109–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36140-1_8.
Full textWeis, Stephen A., Sanjay E. Sarma, Ronald L. Rivest, and Daniel W. Engels. "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems." In Security in Pervasive Computing, 201–12. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-39881-3_18.
Full textGurumoorthy, Sasikumar, L. Venkateswara Reddy, and Sudhakaran Periakaruppan. "Design and Development of an Internet of Things (IoT)-Based Anti-Theft System in Museum Cultural Relics Using RFID." In Advances in Wireless Technologies and Telecommunication, 168–80. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-7685-4.ch013.
Full textFernández-Caramés, Tiago M., Paula Fraga-Lamas, Manuel Suárez-Albela, and Luis Castedo. "A Methodology for Evaluating Security in Commercial RFID Systems." In Radio Frequency Identification. InTech, 2017. http://dx.doi.org/10.5772/64844.
Full textXiao, Yang, Larissa Klimpel, Kaveh Ghaboosi, and Jingyuan Zhang. "Low-Cost Radio Frequency Identification Security." In Security in Distributed and Networking Systems, 151–67. WORLD SCIENTIFIC, 2007. http://dx.doi.org/10.1142/9789812770103_0007.
Full textGódor, Gyozo, and Sándor Imre. "Security Aspects in Radio Frequency Identification Systems." In Next Generation Data Communication Technologies, 187–225. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-477-2.ch009.
Full textPal, Kamalendu. "Radio Frequency Identification Systems Security Challenges in Supply Chain Management." In Smart Devices, Applications, and Protocols for the IoT, 220–42. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7811-6.ch010.
Full textPang, Les. "Radio Frequency IdentificationTechnology in Digital Government." In Information Security and Ethics, 2623–33. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch174.
Full textConference papers on the topic "Radio frequency identification systems Security measures"
Alshammri, Turki, Mohammed Albakheet, and Ibraheem Kateeb. "Survey on Radio Frequency Identification Security and Attacks." In ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3508072.3508095.
Full textShen, Guanxiong, Junqing Zhang, Alan Marshall, Mikko Valkama, and Joseph Cavallaro. "Radio Frequency Fingerprint Identification for Security in Low-Cost IoT Devices." In 2021 55th Asilomar Conference on Signals, Systems, and Computers. IEEE, 2021. http://dx.doi.org/10.1109/ieeeconf53345.2021.9723287.
Full textHlady, Joseph, and Somen Mondal. "Integration of Radio Frequency Identification and GIS for Asset Management." In 2008 7th International Pipeline Conference. ASMEDC, 2008. http://dx.doi.org/10.1115/ipc2008-64062.
Full textMcCoy, Michael, Christopher Isert, Douglas Jackson, and John Naber. "A Frequency Counter Based Analog-to-Digital Converter for a Low-Power RFID Biomedical Telemetry System." In ASME 2007 2nd Frontiers in Biomedical Devices Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/biomed2007-38114.
Full textCouto, Christiana, Gabriela Moutinho de Souza Dias, Ronaldo Moreira Salles, and Gustavo Claudio Karl Couto. "A Scalable and Secure Protocol for RFID Based on “Advanced Encryption Standard” and Elliptic Curve Cryptography." In Simpósio Brasileiro de Computação Ubíqua e Pervasiva. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbcup.2022.222771.
Full textFleisch, Ruth, Robert Schöch, and Christian Hillbrand. "A Batch Tracing System for Thermochemical Finishing Processes Enables New Services for Quality Management." In ASME 2012 11th Biennial Conference on Engineering Systems Design and Analysis. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/esda2012-82299.
Full text