Journal articles on the topic 'Radio frequency identification systems Security measures'

To see the other types of publications on this topic, follow the link: Radio frequency identification systems Security measures.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Radio frequency identification systems Security measures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kang, Jian, Hui Mu, Hui Ren, Jicheng Jia, Lin Qi, and Zherui Zhang. "Electromagnetic Signal Intelligent Identification Based on Radio Frequency Fingerprints." Wireless Communications and Mobile Computing 2022 (June 7, 2022): 1–12. http://dx.doi.org/10.1155/2022/6296954.

Full text
Abstract:
Due to the open nature of WIFI connection, it is exposing its private information to the attackers. Traditional WIFI security methods are no longer able to meet the current security needs, and more and more wireless-side physical layer security solutions provide solutions, among which RF fingerprinting is an endogenous security technology with potential. Constructing an effective and accurate method to identify WIFI devices that steal information is a difficulty that today’s society needs to face. The main problem is not only that the recognition accuracy is difficult to improve but also the problem of data shortage. In this paper, we first construct a large-scale WIFI real-world measurement dataset. Next, we use PSD and bispectrum features, as well as complex ResNet schemes for WIFI device identification experiments, and compare and analyze them from multiple perspectives. The experimental results show that the proposed algorithm can achieve up to 97% recognition accuracy among 100 devices. Moreover, when the SNR is 0 dB, the complex ResNet method can still achieve 78% recognition accuracy among 100 devices. Finally, this paper summarizes the experimental analysis of the measured dataset and discusses the open issues related to this area.
APA, Harvard, Vancouver, ISO, and other styles
2

Lamrani Alaoui, Hasnae, Abdellatif El Ghazi, Mustapha Zbakh, Abdellah Touhafi, and An Braeken. "A Highly Efficient ECC-Based Authentication Protocol for RFID." Journal of Sensors 2021 (July 3, 2021): 1–16. http://dx.doi.org/10.1155/2021/8876766.

Full text
Abstract:
The availability of safety has always been a challenge in all fields of computing and networking, and the development of reliable security measures for low operating power systems has been a continuous task for researchers. This paper focuses on Radio Frequency Identification (RFID) systems, whose market is tremendously growing due to the increasing need for efficient supply chain and healthcare management. Two protocols are proposed that offer mutual authentication, confidentiality, forward security, anonymity, unlinkability, scalability, and resistance against the most important security attacks. They differ in storage requirements at the server side. Both proposed protocols are very efficient as the number of required elliptic curve multiplications is limited to two at the tag side. Moreover, the schemes are also more effective and secure than other related work presented in literature. In addition, we show how to extend the protocols in order to provide authentication with respect to multiple readers.
APA, Harvard, Vancouver, ISO, and other styles
3

Ruhil, Ankit, Dr Manjot Kaur Bhatia, and Pooja kumari. "SLIM: A Lightweight Block Cipher for Internet of Health Things." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 370–81. http://dx.doi.org/10.22214/ijraset.2022.47879.

Full text
Abstract:
Abstract: Increased protection of resource-constrained devices, such as radio frequency identification (RFID) systems, is in high demand these days. For high-resource desktop PCs, current encryption techniques are sufficient. Access control systems, transaction banking systems, and payment systems are all examples of high-security applications where RFID technology are used. The attacker tries to deceive RFIDs in order to gain illegal access to services without paying for them or to get around security measures by detecting a secret password. The most difficult problem with RFID systems is ensuring effective protection against such infringements. For RFID systems, lightweight cryptography can give security assurance. SLIM is a novel ultralightweight cryptography technique for RFID devices presented in this paper. Since block ciphers are the most commonly used cryptographic and provide highly strong protection for IoT devices, SLIM is a 32-bit block cipher based on the Feistel structure. The most difficult aspect of creating a lightweight block cipher is balancing performance, cost, and security. SLIM, like all symmetric block ciphers, encrypts and decrypts using the same key. The suggested method performs well in both hardware and software contexts, has a small implementation footprint, a reasonable cost/security ratio for RFID devices, and is energyefficient. SLIM has shown high immunity to the most successful linear and differential cryptanalysis assaults, as well as a substantial margin of defense against them.
APA, Harvard, Vancouver, ISO, and other styles
4

Wei, Guo-heng, Yan-lin Qin, and Wei Fu. "An Improved Security Authentication Protocol for Lightweight RFID Based on ECC." Journal of Sensors 2022 (February 8, 2022): 1–6. http://dx.doi.org/10.1155/2022/7516010.

Full text
Abstract:
The security, privacy, and operation efficiency of radio frequency identification (RFID) must be fully measured in practical use. A few RFID authentication schemes based on elliptic curve cryptography (ECC) have been proposed, but most of them cannot resist the existing attacks. The scheme presented by Qian et al. could not resist impersonation attack according to our security analysis. Then, we propose a novel lightweight RFID authentication scheme, which is proved that it can resist server spoofing attack, tag masquerade attack, and provide other security properties of a RFID authentication scheme. Comparisons of computation and communication cost demonstrate that the proposed scheme is more suitable for the resource-constrained RFID authentication.
APA, Harvard, Vancouver, ISO, and other styles
5

DeMers, Gerard, Christopher Kahn, Per Johansson, Colleen Buono, Octav Chipara, William Griswold, and Theodore Chan. "Secure Scalable Disaster Electronic Medical Record and Tracking System." Prehospital and Disaster Medicine 28, no. 5 (June 26, 2013): 498–501. http://dx.doi.org/10.1017/s1049023x13008686.

Full text
Abstract:
AbstractIntroductionElectronic medical records (EMRs) are considered superior in documentation of care for medical practice. Current disaster medical response involves paper tracking systems and radio communication for mass-casualty incidents (MCIs). These systems are prone to errors, may be compromised by local conditions, and are labor intensive. Communication infrastructure may be impacted, overwhelmed by call volume, or destroyed by the disaster, making self-contained and secure EMR response a critical capability.ReportAs the prehospital disaster EMR allows for more robust content including protected health information (PHI), security measures must be instituted to safeguard these data. The Wireless Internet Information System for medicAl Response in Disasters (WIISARD) Research Group developed a handheld, linked, wireless EMR system utilizing current technology platforms. Smart phones connected to radio frequency identification (RFID) readers may be utilized to efficiently track casualties resulting from the incident. Medical information may be transmitted on an encrypted network to fellow prehospital team members, medical dispatch, and receiving medical centers. This system has been field tested in a number of exercises with excellent results, and future iterations will incorporate robust security measures.ConclusionA secure prehospital triage EMR improves documentation quality during disaster drills.DeMersG, KahnC, JohanssonP, BuonoC, ChiparaO, GriswoldW, ChanT. Secure scalable disaster electronic medical record and tracking system. Prehosp Disaster Med. 2013;28(5):1-4.
APA, Harvard, Vancouver, ISO, and other styles
6

Gvozdenovic, Nikola, Ralph Prestros, and Christoph F. Mecklenbräuker. "Far-Field Testing Method of Spurious Emission Produced by HF RFID." International Journal of Antennas and Propagation 2016 (2016): 1–6. http://dx.doi.org/10.1155/2016/4715898.

Full text
Abstract:
We present measurements of spurious emission produced by high-frequency radio frequency identification (HF RFID) using carrier frequency of 13.56 MHz. HF RFID tags produce unwanted emission due to rectification and more generally due to nonlinearity of analog front end. Depending on the conducting material of an HF RFID coil and surrounding dielectric material, the coil behaves as more or less good antenna on some harmonic frequencies. Exact characterization and analysis of unwanted emission is important from the security perspective as well as from the perspective of interference with other systems. Consequently we measured the harmonics produced in the integrated circuitry and characterized radiation properties of the antenna. Finally we present the measurements of the spurious emission performed in a Gigahertz Transverse Electromagnetic (GTEM) cell.
APA, Harvard, Vancouver, ISO, and other styles
7

Ogurtsov, Maxim, Vyacheslav Korolyov, and Oleksandr Khodzinskyi. "To the Problems of the National State Recognition System Improving." Cybernetics and Computer Technologies, no. 2 (September 30, 2022): 74–82. http://dx.doi.org/10.34229/2707-451x.22.2.8.

Full text
Abstract:
Introduction. A rapid increase in the number of objects that simultaneously take part in combat operations in the air requires improvement of systems for recognizing military objects both in terms of qualitative and quantitative indicators. This requires the development of appropriate algorithms for identifying new-generation "friend-foe" objects. Such algorithms can be based on various methods of information security, in particular symmetric and asymmetric cryptographic algorithms and other methods of cryptography. The purpose of the article is to survey modern systems of state recognition of objects (SSRO), identify their shortcomings and provide recommendations for their elimination. Results. The requirements for SSRO as a system for processing, transmitting, securing information and identifying objects based on cryptography and computer security methods are defined. Common and distinctive features for civil and military identification systems are highlighted. The advantages and disadvantages of the existing SSRO are shown. Recommendations are formulated to address the shortcomings of the existing SSRO. An example of a stand and a hardware and software basis for studying SSRO algorithms with backup channels is given. Conclusions. Eliminating the shortcomings of the SSRO and improving the level of its reliability will require the implementation of the following organizational and technical measures. 1. Replacing the current state recognition system with a more modern one, which will support more modern cryptographic algorithms and a larger number of recognition objects. Adding support for radio tag recognition (RF tags). 2. Support for recognition lines in various directions, including "ground – UAV", "plane – tank", "plane – UAV" and others. Adding support for the NATO standard – STANAG 4579, adopted in 2001, and others. 3. Using of broad-spectrum signals to reduce the probability of detection and interception, as well as a number of signal-code structures and a working frequency grid. Keywords: Friend-or-Foe, object identification, cryptography, backup channels.
APA, Harvard, Vancouver, ISO, and other styles
8

El Khamlichi, Mohamed, Alejandro Alvarez Melcon, Otman El Mrabet, Mohammed Ali Ennasar, and Juan Hinojosa. "Flexible UHF RFID Tag for Blood Tubes Monitoring." Sensors 19, no. 22 (November 9, 2019): 4903. http://dx.doi.org/10.3390/s19224903.

Full text
Abstract:
Low-cost and flexible radio frequency identification (RFID) tag for automatic identification, tracking, and monitoring of blood products is in great demand by the healthcare industry. A robust performance to meet security and traceability requirements in the different blood sample collection and analysis centers is also required. In this paper, a novel low-cost and flexible passive RFID tag is presented for blood sample collection tubes. The tag antenna is based on two compact symmetrical capacitive structures and works at the ultra-high frequency (UHF) European band (865 MHz–868 MHz). The tag antenna is designed considering the whole dielectric parameters such as the blood, substrate and tube. In this way, it operates efficiently in the presence of blood, which has high dielectric permittivity and loss. Measurement results of the proposed tag have confirmed simulation results. The measured performance of the tag shows good matching in the desired frequency band, leading to reading ranges up to 2.2 m, which is 4.4 times higher than typical commercial tags. The potential of this tag as a sensor to monitor the amount of blood contained in clinic tubes is also demonstrated. It is expected that the proposed tag can be useful and effective in future RFID systems to introduce security and traceability in different blood sample collection and analysis centers.
APA, Harvard, Vancouver, ISO, and other styles
9

Andziulis, Arūnas, Rimantas Plėštys, Sergej Jakovlev, Danielius Adomaitis, Konstantin Gerasimov, Mindaugas Kurmis, and Valdemaras Pareigis. "PRIORITY BASED TAG AUTHENTICATION AND ROUTING ALGORITHM FOR INTERMODAL CONTAINERS RFID SENSOR NETWORK." TRANSPORT 27, no. 4 (December 21, 2012): 373–82. http://dx.doi.org/10.3846/16484142.2012.750622.

Full text
Abstract:
Intermodal containers transportation management has always been a serious issue among logistics worldwide companies where the application of secure mobile information technologies (e.g. radio frequency identification systems (RFID) and sensor networks) could significantly improve the current situation by sending managers all the needed transportation conditions information. In this paper, we have focused on improving managerial decision making method by introducing the expert system evaluation functionality in a common software solution CTRMS for additional ICT risks evaluation. The basic risks involved in transportation and the appropriate measures are introduced as well. The pre-defined RFID sensor network was used to develop an optimal tag authentication and routing algorithm where tags and reader authentication protocols were defined and based upon the highest security assurance and the reader to tag response time criterias. A Nearest Neighbor (NN) heuristic approach and a Priority setting method were used to address the problem of routing within the RFID sensor network between tags with the objective function of minimizing the data transfer time between tags with the highest priority values. Computational results also indicate that when the tags have the same level of confidence in the system, they can exchange information without any additional verification, so making the authentication protocol less time consuming and therefore more effective against other proposed protocols.
APA, Harvard, Vancouver, ISO, and other styles
10

Lv, Hao, Teng Jiao, Yang Zhang, Fulai Liang, Fugui Qi, and Jianqi Wang. "A Novel Method for Breath Detection via Stepped-Frequency Continuous Wave Ultra-Wideband (SFCW UWB) Radars Based on Operational Bandwidth Segmentation." Sensors 18, no. 11 (November 10, 2018): 3873. http://dx.doi.org/10.3390/s18113873.

Full text
Abstract:
Human being detection via ultra-wideband (UWB) radars has shown great prospects in many areas, such as biomedicine, military operation, public security, emergency rescue, and so on. When a person stays stationary, the main feature that separates him/her from surroundings is the movement of chest wall due to breath. There have been many algorithms developed for breath detection while using UWB radars. However, those algorithms were almost based on a basic scheme that focused on processing in the time dimension of UWB data. They did not utilize the benefits from the wide operational bandwidth of UWB radars to show potential superiority over those narrowband systems such as a continuous wave (CW) Doppler radar. In this paper, a breath detection method was proposed based on operational bandwidth segmentation. A basic theoretical model was firstly introduced, indicating that characteristics of breath signals contained in UWB echoes were consistent among the operational frequencies, while those of clutters were not. So, the method divided a set of UWB echo data into a number of subsets, each of which corresponded to a sub-band within the operational bandwidth of the UWB radar. Thus information about the operational frequency is provided for subsequent processing. With the aid of the information, a breath enhancement algorithm was developed mainly by averaging the segmented UWB data along the operational frequency. The algorithm’s performance was verified by data measured by a stepped-frequency CW (SFCW) UWB radar. The experimental results showed that the algorithm performed better than that without the segmentation. They also showed its feasibility for fast detection of breath based on a short duration of data. Moreover, the method’s potential for target identification and impulse-radio (IR) UWB radar was investigated. In summary, the method provides a new processing scheme for UWB radars when they are used for breath detection. With this scheme, the UWB radars have a benefit of greater flexibility in data processing over those narrowband radars, and thus will perform more effectively and efficiently in practical applications.
APA, Harvard, Vancouver, ISO, and other styles
11

Sun, L. "Security and privacy on low-cost Radio Frequency Identification systems." International Journal of Security and Networks 5, no. 2/3 (2010): 128. http://dx.doi.org/10.1504/ijsn.2010.032211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Mazlan, Muhammad Syamil, Isredza Rahmi A Hamid, and Hazalila Kamaludin. "Radio Frequency Identification (RFID) Based Car Parking System." JOIV : International Journal on Informatics Visualization 2, no. 4-2 (September 10, 2018): 318. http://dx.doi.org/10.30630/joiv.2.4-2.173.

Full text
Abstract:
Radio Frequency Identification (RFID) technology is widely used in various applications such as attendance system, tracking system, monitoring system or parking system. Currently, the existing parking system used manual entrance through security guard to access the premise. Therefore, the company need to hire security guard to monitor the premise. In addition, the security guards need to monitor all movement of vehicle or person that enter or leave the premise. As a result, unauthorized vehicle or person can easily access the building. To address this problem, we proposed a parking system using RFID technology that can monitor vehicle’s movement that enter or leave the specific area or place by scanning the RFID tag. The potential benefit is it can improve security for both security guards and users. Besides that, this parking system can facilitate access control for users and improve traffic flow during peaks period. There are five modules in the proposed parking systems which are user registration, vehicle registration, RFID tag, staff and report generation.
APA, Harvard, Vancouver, ISO, and other styles
13

Alotaibi, Majid, Mohsin Murad, Shakir A. H. Alhuthali, Faisal R. Al-Osaimi, and Fahd Aldosari. "MIMO Radio Frequency Identification: A Brief Survey." Sensors 22, no. 11 (May 28, 2022): 4115. http://dx.doi.org/10.3390/s22114115.

Full text
Abstract:
In this paper, we briefly look at the latest state-ot-the-art in the domain of multi-input multi-output (MIMO) radio frequency identification (RFID) systems while detailing the work done in the domain of anti-collision, range enhancements, bit error rate (BER) improvements and security. Various passive ultra-high frequency (UHF) RFID implementations are considered that employ multiple antennas at the reader and single or multiple antennas at each tag. We look at several recent works those explored MIMO for RFID receivers. When using MIMO at the backscatter channel, significant improvements can be achieved in the BER as well as range extension. With the extra reliability and increased throughput, such systems can be deployed in many important applications like large tag reading scenarios and accurate tracking. Increased throughput is directly dependent on estimation of tag quantity in a bulk reading environment and usually estimators designed for single antenna systems under-perform in such settings causing low signal to noise ratio (SNR) when employed in MIMO systems where tag signal overlapping can happen more often. One of the key challenges is to keep the design of the RFID tag simple, cutting cost and power requirement when employing anti-collision schemes. We provide a brief survey in some of the recent developments related to MIMO RFID systems, the protocols and algorithms used, and improvements achieved.
APA, Harvard, Vancouver, ISO, and other styles
14

Shyamala, C. K., and Anand K. Rajagopalan. "A lightweight inter-zonal authentication protocol for moving objects in low powered RF systems." APTIKOM Journal on Computer Science and Information Technologies 2, no. 3 (January 22, 2020): 106–16. http://dx.doi.org/10.34306/csit.v2i3.72.

Full text
Abstract:
Automatic identification systems represent a wide classification of devices used primarily in commercialsettings for inventory/logistics control. Familiar examples of such devices are bar codes, magnetic strips, smartcards, RFID (Radio frequency identification) and biometric and voice recognition. Security is especially lax in low powered RF (radio frequency) systems communicating through an unsecured radio wave channel. Security represents a critical component for enabling the large scale adoption of automatic identification systems. Providing an effective security solution for low powered systems is a major area of concern; it directs research towards ‘power consumption aware’ computations in security solutions. This paper proposes a Lightweight Inter-Zonal Authentication Protocol for moving objects in low powered RF systems. Formal validation and a thorough analysis of the protocol in SPAN security tool reveals its effectiveness and resiliency to attacks–eaves dropping, reader and tag impersonation, replay and desynchronization.
APA, Harvard, Vancouver, ISO, and other styles
15

Zhang, Shiyong, and Gongliang Chen. "Micro-Trivium: A lightweight algorithm designed for radio frequency identification systems." International Journal of Distributed Sensor Networks 13, no. 2 (February 2017): 155014771769417. http://dx.doi.org/10.1177/1550147717694171.

Full text
Abstract:
Distributed sensor networks have been widely applied to healthcare, environmental monitoring and management, intelligent transportation, and other fields in which network sensors collect and transmit information about their surrounding environment. Radio frequency identification technology transmits an object’s identification as a unique serial number—using radio waves as the transmission carrier—and is becoming an important building block for distributed sensor networks. However, the security of radio frequency identification systems is a major industrial concern that can significantly hinder the market growth of distributed sensor networks. Trivium is a well-known lightweight synchronous stream cipher that was submitted to the European eSTREAM project in April 2005. In this article, we generalize Trivium to the Trivium-Model algorithm and highlight that security is mainly determined by the internal state bits and the number of nonlinear terms. We propose principles for choosing parameters and generating better parameters that are feasible for low-cost radio frequency identification tags in distributed sensor networks. The new algorithm, named Micro-Trivium, requires less power and a smaller chip area than the original Trivium, which is proven using experimental data and results. Mathematical analysis shows that using Micro-Trivium is as secure as using Trivium.
APA, Harvard, Vancouver, ISO, and other styles
16

Shyamala, C. K., and Anand K Rajagopalan. "A Lightweight Inter-Zonal Authentication Protocol for Moving Objects in Low Powered RF Systems." APTIKOM Journal on Computer Science and Information Technologies 2, no. 3 (November 1, 2017): 106–16. http://dx.doi.org/10.11591/aptikom.j.csit.69.

Full text
Abstract:
Automatic identification systems represent a wide classification of devices used primarily in commercial settings for inventory/logistics control. Familiar examples of such devices are bar codes, magnetic strips, smart cards, RFID (Radio frequency identification) and biometric and voice recognition. Security is especially lax in low powered RF (radio frequency) systems communicating through an unsecured radio wave channel. Security represents a critical component for enabling the large scale adoption of automatic identification systems. Providing an effective security solution for low powered systems is a major area of concern; it directs research towards ‘power consumption aware’ computations in security solutions. This paper proposes a Lightweight Inter-Zonal Authentication Protocol for moving objects in low powered RF systems. Formal validation and a thorough analysis of the protocol in SPAN security tool reveals its effectiveness and resiliency to attacks – eaves dropping, reader and tag impersonation, replay and desynchronization.
APA, Harvard, Vancouver, ISO, and other styles
17

Sujana Eka Putra, I. Gede, and Ni Luh Putu Labasariyani. "Design and Development of Login Security System Using Radio Frequency Identification." Logic : Jurnal Rancang Bangun dan Teknologi 19, no. 1 (March 30, 2019): 41. http://dx.doi.org/10.31940/logic.v19i1.1301.

Full text
Abstract:
System security is important in information systems to prevent unauthorized users from accessing data. Login system applies security using encrypted passwords stored on RFID cards. This research designed login security system storing encrypted password using MD5 encryption into the Mifare Tag RFID card and equipped NFC reader to read data from RFID Card. By storing encrypted password characters on RFID cards, login system security is stronger and cannot be traced by unauthorized parties to log into systems. Some stage of system design are through study of literature, designing process flow, system algorithms, designing encryption methods and system interfaces, writing card module coding, card reading module coding, implementation, and system testing. The system login applied by scanning RFID card on the NFC reader, if the password on RFID matches then the user successfully logs into the system. Based on the testing of RFID Tag readings, the maximum distance from the reading of RFID Tag cards is up to 7 cm with a reading range of 00 to 300 with a success rate of 100% authentication. By using RFID Tag cards, increase security for logging into the system, because user cannot log in without having a card with the appropriate password.
APA, Harvard, Vancouver, ISO, and other styles
18

Ning, Huansheng, Hong Liu, Laurence T. Yang, and Yan Zhang. "Dual cryptography authentication protocol and its security analysis for radio frequency identification systems." Concurrency and Computation: Practice and Experience 24, no. 17 (September 22, 2011): 2040–54. http://dx.doi.org/10.1002/cpe.1827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Zhang, Zhen, Yibing Li, Chao Wang, Meiyu Wang, Ya Tu, and Jin Wang. "An Ensemble Learning Method for Wireless Multimedia Device Identification." Security and Communication Networks 2018 (October 15, 2018): 1–9. http://dx.doi.org/10.1155/2018/5264526.

Full text
Abstract:
In the last decade, wireless multimedia device is widely used in many fields, which leads to efficiency improvement, reliability, security, and economic benefits in our daily life. However, with the rapid development of new technologies, the wireless multimedia data transmission security is confronted with a series of new threats and challenges. In physical layer, Radio Frequency Fingerprinting (RFF) is a unique characteristic of IoT devices themselves, which can difficultly be tampered. The wireless multimedia device identification via Radio Frequency Fingerprinting (RFF) extracted from radio signals is a physical-layer method for data transmission security. Just as people’s unique fingerprinting, different Internet of Things (IoT) devices exhibit different RFF which can be used for identification and authentication. In this paper, a wireless multimedia device identification system based on Ensemble Learning is proposed. The key technologies such as signal detection, RFF extraction, and classification model are discussed. According to the theoretical modeling and experiment validation, the reliability and the differentiability of the RFFs are evaluated and the classification results are shown under the real wireless multimedia device environments.
APA, Harvard, Vancouver, ISO, and other styles
20

Liu, Guo Zhu, and Xiao Kun Zheng. "Research of RFID System Security." Applied Mechanics and Materials 321-324 (June 2013): 2653–56. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2653.

Full text
Abstract:
Radio Frequency Identification (RFID) technology has been gradually into our daily production and life as a new non-contact automatic identification technology.However , the limited resources of low-cost RFID largely restrict the implementation of RFID security mechanisms,which leads to personal privacy issues ,and the issues greatly hinder the rapid adoption of the technology.Here, RFID communication model and security requirements are discussed,and then it analyzes the security solutions for low-cost RFID systems.
APA, Harvard, Vancouver, ISO, and other styles
21

Dong, Qingkuan, Mengmeng Chen, Lulu Li, and Kai Fan. "Cloud-based radio frequency identification authentication protocol with location privacy protection." International Journal of Distributed Sensor Networks 14, no. 1 (January 2018): 155014771875496. http://dx.doi.org/10.1177/1550147718754969.

Full text
Abstract:
With the development of the Internet of things and cloud storage, a large number of objects access to the Internet through radio frequency identification technology, cloud-based radio frequency identification system attracts more attention because it can reduce the costs of system maintenance by renting the cloud storage service on demand. Especially, it is very suitable for the small- and medium-sized enterprises. However, the security and privacy issues of the cloud-based radio frequency identification system are more serious than traditional radio frequency identification systems. The link between the reader and the cloud is no longer secure, and the cloud service provider is not trusted. Both the location privacy of the reader and the data privacy of the radio frequency identification system are not able to be exposed to the cloud service provider. In this article, a cloud-based radio frequency identification authentication protocol is proposed. It considers not only the mutual authentication between the reader and the tag, but also the security of data transmission between the reader and the cloud database. In particular, in order to solve the reader’s location privacy problem, the proposed scheme introduces MIPv6 network framework without adding additional infrastructure. The experimental verification with AVISPA tool shows that the protocol satisfies the mutual authentication property. Compared with other cloud-based schemes, the proposed protocol has obvious advantages in deployment cost, scalability, real-time authentication, and the tag’s computational complexity.
APA, Harvard, Vancouver, ISO, and other styles
22

C. S., Okafor, Nnebe S. U., Alumona T. L., Onuzuluike V. C., and Jideofor U. C. "Door Access Control Using RFID and Voice Recognition System." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 157–63. http://dx.doi.org/10.22214/ijraset.2022.40453.

Full text
Abstract:
Abstract: Security is one of the major challenges faced by individuals, organizations, and the world at large. The evolution of technology assists in solving this menace of insecurity and with the continuous growth in technology; several techniques have been used in tackling this problem of insecurity, starting from traditional systems like the door locks with handles to automated doors. In recent times, most of these doors lock security systems are based on microcontrollers, GSM, GPS, sensors, biometrics like eye scanner, fingerprint, face recognition, password, etc., and each of these techniques has its advantages and disadvantages. The developed system involves the design of a prototype door access control system that will control the access of personnel to a location/office using voice recognition and Radio Frequency Identification (RFID) authentication techniques. The system at first detects the movement of a person and prompts the person for verification. If verified either by voice or by RFID, the door automatically opens and closes after 5 seconds. The aim of this developed system is to restrict the access of an office/location using Radio Frequency Identification and voice recognition authentication, thus offering security to the lives and properties of people. Keywords: Biometrics, Radio Frequency Identification (RFID), LCD, Arduino, GPS, GSM
APA, Harvard, Vancouver, ISO, and other styles
23

Simanjuntak, Herwin, Rully Pramudita, and Nadya Safitri. "Sistem Keamanan Sepeda Motor Menggunakan GPS Dan Radio Frequency Identification (RFID) Berbasis Arduino." Jurnal ICT : Information Communication & Technology 19, no. 2 (January 20, 2021): 47–53. http://dx.doi.org/10.36054/jict-ikmi.v20i2.263.

Full text
Abstract:
Abstract- At this time motorcycle theft cases are still often occur plus the increasing use of motorcycle vehicles, motorcycle theft is caused by the lack of a security system on the ignition which only uses keys and key covers, where security systems like this have been understood mostly motorcycle thieves, the necessity of a motorcycle safety system is needed. To overcome this, a Motorcycle Safety System was made using Arduno-based GPS and Radio Frequency Identification (RFID) to prevent and facilitate the recovery of stolen motor vehicles. The results of this study, the system is made using the Global Positioning System (GPS) as a tool to detect the location of motorcycles, and smart key contacts are added using RFID, SMS gateway and DC-DC Converter.
APA, Harvard, Vancouver, ISO, and other styles
24

Syahid, Syahid. "Automatic Door Based on Radio Frequency Identification (RFID) and Password in Electrical Engineering Laboratory." JAICT 4, no. 1 (May 6, 2019): 6. http://dx.doi.org/10.32497/jaict.v4i1.1433.

Full text
Abstract:
RFID (Radio Freq uency Identification) systems are used as personal identification cards in the room access system especially in Electrical Engineering Laboratory. This system is intended to maintain the security and privacy of the room from someone who does not have the authority to enter the room. This security system uses a two-tier security system, namely through an RFID identity card and security code. The design and implementation of this system, an electric key work system is evaluated based on the solenoid component and the password used when accessing the room. RFID tags used in this system are in the form of "Mifare RFID Card 13.56 Mhz" cards and store unique codes used as personal identification. This code is read by the RFID reader in validating its authority with Arduino Mega 2560 to regulate the system of electric locks and passwords used to open the door. From the test results, 100% RFID tags can be recognized by the RFID reader, 100% RFID tag and password reading system is successfully used to access the room.
APA, Harvard, Vancouver, ISO, and other styles
25

Yurindra, Yurindra, and Agusta Dirga Saputra. "Sistem Keamanan Ruangan Dengan Perekaman Visual Berbasis Radio Frekuensi Identification Dan Pre Hypertext Processor (PHP) di Loka Monitor Spektrum Frekuensi Radio." Jurnal Sisfokom (Sistem Informasi dan Komputer) 2, no. 2 (October 1, 2013): 47. http://dx.doi.org/10.32736/sisfokom.v2i2.217.

Full text
Abstract:
The purpose of the thesis was to produce concrete results in providing security to the agencies that require special security. The method used in the manufacture of home lighting control devices based microcontroller using android smartphone is a prototype. This research method consists of several stages, library research, analytical methods, design methods, and implementation. The results achieved are ketenanagan perceived by the security agencies in masaah increased after he made these security systems. Where this tool uses a layered security system using Radio Frequency Identification (RFID) integrated with any database access. The results of testing this tool ebrhasil well where the user can sign in using RFID card and the user is not registered will be blocked and taken kgambar as evidence.
APA, Harvard, Vancouver, ISO, and other styles
26

Syukuryansyah, Ridho, Didik Setiyadi, and Syahbaniar Rofiah. "PENERAPAN RADIO FREQUENCY IDENTIFICATION DALAM MEMBANGUN SISTEM KEAMANAN DAN MONITORING SMART LOCK DOOR BERBASIS WEBSITE." Infotech: Journal of Technology Information 6, no. 2 (November 26, 2020): 83–90. http://dx.doi.org/10.37365/jti.v6i2.91.

Full text
Abstract:
Technology in this modernization era helps many workers and human needs. Various fields have been encroached upon by technology and one cannot be released again, one of which is security systems. The need for increased security is based on human needs for a sense of comfort with the assets they have in a safe condition and can be monitored from anytime and anywhere. This research aims to build a security system using RFID and Arduino which can be monitored through the website. An early warning system for unknown objects is also embedded therein using a magnetic switch sensor on the door, buzzer to create sound frequencies that can attract the attention of the surrounding environment and the Arduino camera module to capture images of objects. The results of this research RFID can facilitate access in and out of the door and increase security compared to conventional keys. Only registered / known objects can access the room through the door. In and out activities are monitored through a website that can be accessed anytime and anywhere.
APA, Harvard, Vancouver, ISO, and other styles
27

Umamaheswari, Sabari L., Thota Dhana Sekhar, S. Guna Saideep, S. Joshua, Arimani Munirakesh, and T. Jebamani. "Radio Frequency Identification System and IoT based Tech Genix Lock." Revista Gestão Inovação e Tecnologias 11, no. 4 (September 16, 2021): 5564–76. http://dx.doi.org/10.47059/revistageintec.v11i4.2579.

Full text
Abstract:
In this paper a Door lock system using RFID and IOT Technologies. Using smart phone with Blynk App the Admin or owner can remotely monitor, control (ON & OFF the access) and can get Blynk notifications from the door lock when someone try to access it or if any suspicious activity happens (someone try to break the it). The registered User will receive Gmail’s when he tries to unlock the door. Other features are the admin or owner can remotely unlock and lock the door from any place, and he can disable the switch which is used for getting out from the room, for blocking the unknown persons who went with theft RFID card, it is done by seeing the notifications send to the user when door is unlocked with his card through Admin. For authorized person the lock will be opened and closed automatically after a predetermined delay. If it is an unauthorized person tries it alerts the admin and neighbors through a Blynk notification and buzzer sound. Thus, once implemented, the system will prove An Effective security with minimum cost and increase in comfort for system users and also more efficient compared to existing cost ineffective systems.
APA, Harvard, Vancouver, ISO, and other styles
28

Zavvari, Azam, and Ahmed Patel. "Critical Evaluation of RFID Security Protocols." International Journal of Information Security and Privacy 6, no. 3 (July 2012): 56–74. http://dx.doi.org/10.4018/jisp.2012070103.

Full text
Abstract:
Radio Frequency Identification (RFID) system is a low-cost contactless automatic identification technology; and barcode as a traditional technology is now broadly replaced by RFID systems to make objects more manageable in supply chains and other enterprises. This technology is operational in open wireless communication spaces whereby its transmission signals can be easily accessed resulting in security problems. Consequently, it becomes an absolute necessity to develop efficient security protocols to protect the data against various attacks. This paper outlines a critical evaluation of the RFID systems, the security and privacy issues in the RFID security protocols, the EPCglobal Class-1 Generation-2 standard as it is an international standard, its lower cost of implementation, and high speed data transmission and operation.
APA, Harvard, Vancouver, ISO, and other styles
29

Qin, Hang, and Yi Liu. "A Secure Lightweight Mutual Authentication for RFID Systems." Applied Mechanics and Materials 644-650 (September 2014): 4496–500. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.4496.

Full text
Abstract:
Radio Frequency Identification (RFID) technology is an automated identification technology which is widely used to identify and track all kind of objects. It is well suitable for many fields and is expected to replace barcodes in the near future. However, it is a challenging task to design an authentication protocol because of the limited resource of low-cost RFID tags. Recently, a lightweight RFID authentication protocol presented by Kulseng et al uses Physically Unclonable Functions (PUFs) and Linear Feedback Shift Registers (LFSRs) which are well known lightweight operations. The number of gates which the protocol require can be significantly decreased. Unfortunately, their protocol faces several serious security issues. In this paper, based PUFs and LFSRs, we suggest a secure mutual authentication for low-cost RFID Systems. Security analysis shows that our protocol owns security and privacy.
APA, Harvard, Vancouver, ISO, and other styles
30

Phiri, Misheck, and Lincoln Nhapi. "SURVEY PAPER ON AUTOMATED ELECTRONIC TOLLING SYSTEMS USING RADIO FREQUENCY IDENTIFICATION TECHNOLOGY." International Journal of Technology and Systems 7, no. 1 (May 25, 2022): 20–37. http://dx.doi.org/10.47604/ijts.1544.

Full text
Abstract:
Purpose: In this paper we carry out a review on Automated e-tolling systems using RFID technology that has already been proposed by other researchers. Analysed and synthesised the researchers’ solutions and identifying their advantages and disadvantages, and also the gap they left that needs further research. Methodology: the approach used to conduct this review was to collect extensive peer reviewed literature on how solutions by several authors’ RFID technology implementation for Automated e-tolling systems helped collect road tax automatically and efficiently around the world with the effect of eliminating vehicle congestion around toll plazas. A prototype was developed to test the effectiveness of our proposed solution. Findings: This study found out that the use of RFID technology in Automated E-tolling systems is the cheapest and most effective way of collecting road tax revenue without delaying motor vehicles. Furthermore, enables vehicles to pay road tax while moving. This study also revealed that for the Automated E-tolling system to be secure and efficient the communication between RFID tag and reader has to be secured. Due to limitations in resources in cheap passive RFID tags, text steganography using Unicode zero width characters is most appropriate due to its high embedding capacity and very low processing needed. Unique contribution to theory, practice and policy: The review was able to bring out the importance of securing the communication between tag and reader thus building a system with security from design not as an afterthought. It also reveals the use of text steganography as a way of preserving tag privacy. Vehicle congestion at toll collection points has a domino effect of causing pollution to the environment, loss of productive time while waiting in the queue at toll plazas to be saved and also loss of fuel while the vehicle is idling waiting for its turn to be saved. Automated e-tolling systems using RFID technology also reduces the cost of collecting road taxes by significantly reducing the manpower needed at various toll plazas thereby making the system more efficient than the current manual or semi-automated toll collection systems currently available in Zimbabwe.
APA, Harvard, Vancouver, ISO, and other styles
31

Zhang, Tiantian, Pinyi Ren, Dongyang Xu, and Zhanyi Ren. "Intelligent Radio Frequency Identification for URLLC in Industrial IoT Networks." Symmetry 14, no. 4 (April 12, 2022): 801. http://dx.doi.org/10.3390/sym14040801.

Full text
Abstract:
In the era of Industry 4.0, there are many emerging industrial Internet of Things (IIoT) applications that require ultrareliable and low-latency communications (URLLCs), such as time-sensitive networking (TSN), status reporting, and remote control. With the deployment of massive intelligent devices in IIoT networks, providing security for device physical-layer access is a challenging issue, especially for URLLC applications with strict latency and reliability constraints. We thus developed an intelligent radio frequency identification (RFI) framework to provide a lightweight and energy-efficient physical-layer access scheme for URLLCs via leveraging unique hardware-level imperfections of transmitter. We propose a novel semisupervised-learning (SSL) algorithm to realize intelligent RFI in URLLCs scenarios. One-dimensional network construction is also exploited to improve the accuracy of the proposed SSL algorithm. On the basis of the proposed RFI framework, we analyze the overall uplink transmission error probability and network availability of URLLCs with massive MIMO, which can achieve comparable symmetry performance with that of downlink, and experimental evaluation is also provided to gain comprehensive insight on RFI. Numerical and experimental results demonstrate the effectiveness of our proposed RFI framework and the impact of channel correlation, and provide design guidelines for supporting the radio frequency identification of URLLC applications in IIoT systems.
APA, Harvard, Vancouver, ISO, and other styles
32

Zuo, Yanjun. "Survivability Enhancing Techniques for RFID Systems." International Journal of Handheld Computing Research 2, no. 1 (January 2011): 25–40. http://dx.doi.org/10.4018/jhcr.2011010102.

Full text
Abstract:
Radio Frequency Identification (RFID) has been applied in various high security and high integrity settings. As an important ubiquitous technique, RFID offers opportunities for real-time item tracking, object identification, and inventory management. However, due to the high distribution and vulnerability of its components, an RFID system is subject to various threats which could affect the system’s abilities to provide essential services to users. Although there have been intensive studies on RFID security and privacy, there is still no complete solution to RFID survivability. In this paper, the authors classify the RFID security techniques that could be used to enhance an RFID system’s survivability from three aspects, i.e., resilience, robustness and fault tolerance, damage assessment and recovery. A threat model is presented, which can help users identify devastating attacks on an RFID system. An RFID system must be empowered with strong protection to withstand those attacks and provide essential functions to users.
APA, Harvard, Vancouver, ISO, and other styles
33

Tao, Xiao Xia, Hong Yang, Rong Chen, and Zhen Jun Du. "An Improvement on Randomly Changed Identification Protocol for Low-Cost Tags." Advanced Materials Research 562-564 (August 2012): 1583–89. http://dx.doi.org/10.4028/www.scientific.net/amr.562-564.1583.

Full text
Abstract:
With the benefits to improve productivity and reduce operation cost, RFID (Radio Frequency Identification) has recently seen a great increase in a wide variety of business information systems. However, the downside in business applications is the problem caused by data security and privacy. Enhancement without extra costs in RFID identification poses new challenges to privacy and security in RFID-driven just-in-time business information systems. In this paper, we propose an unilateral randomly authentication protocol on the basis of one-way hash function for low-cost RFID tags. We illustrate the whole operating procedure of the proposed protocol in a typical RFID system. Experimental results show that the proposed protocol has some security improvements in data consistency and can work against some attacks like eavesdropping and DoS, compared with several existing methods.
APA, Harvard, Vancouver, ISO, and other styles
34

Susanto, Eko, Herlinawati Herlinawati, and Umi Murdika. "Rancang Bangun Sistem Keamanan Ganda Interaktif Kendaraan Bermotor Roda Dua Berbasis RFID (Radio Frequency Identification)." Electrician 8, no. 2 (May 4, 2014): 57–67. http://dx.doi.org/10.23960/elc.v8n2.125.

Full text
Abstract:
Intisari — Rancang bangun sistem keamanan ganda interaktif kendaraan bermotor roda dua berbasis RFID dilengkapi fitur keamanan darurat dengan akurasi dan presisi yang menunjang terwujudnya sistem keamanan interaktif. Metode penelitian yang dilakukan berupa perancangan dan pengujian (pengujian subsistem dan pengujian sistem keseluruhan). Data penelitian berupa data hasil pengujian subsistem identifikasi RFID, deteksi GPS, aksi Rele, dan komunikasi GSM. Sistem keamanan ganda kendaraan bermotor roda dua berbasis RFID yang dihasilkan sesuai dengan ketentuan fungsi sistem yang interaktif. Sistem memiliki rata-rata waktu tunda kerja sebesar 5.6 detik untuk awal sistem dihidupkan dan 1.6 detik untuk aksi terhadap kondisi masukan. Waktu tunda terjadi akibat penggunaan sepasang pin komunikasi serial mikrokontroler Arduino Uno R3 yang harus memenuhi kebutuhan proses komunikasi serial sistem untuk identifikasi RFID, deteksi GPS, dan komunikasi GSM dalam satu waktu. Kata kunci — Sistem keamanan, RFID, GPS, GSM Abstract — The interactive double security system of two-wheeled motor vehicles design based on RFID equipped with an emergency security features with accuracy and precision that support the realization of an interactive security system. The method of research was done by designing and testing (subsystem testing and overall system testing). Research data was result data testing of RFID identification subsystem, GPS detection , the relay action, and GSM communication. The interactive double security system of two-wheeled motor vehicles design based on RFID that created was according to the provisions of interactive system functions. The system had an average of delay time 5.6 seconds for system starting and 1.6 seconds for the action of input conditions. Delay time caused by the use of only a pair of Arduino Uno R3 Microcontroller serial communication pin which is should meet the needs of serial communication systems for RFID identification, GPS detection, and GSM communication at one time. Keywords— Security System, RFID, GPS, GSM.
APA, Harvard, Vancouver, ISO, and other styles
35

Hazarika, Hirak Jyoti, and S. Ravikumar. "Implementation and integration of radio-frequency identification system: a practical approach." Library Hi Tech News 36, no. 4 (June 3, 2019): 13–16. http://dx.doi.org/10.1108/lhtn-02-2019-0009.

Full text
Abstract:
Purpose The purpose of this paper is to explain how the author had carried out the implementation of the radio-frequency identification (RFID) system at Central Library, Fakiragram College and to explain to the library professional on how to integrate RFID with Koha integrated library management system (ILMS) in their respective library without taking IT/technical experts assistance. This paper will encourage library professionals to implement RFID technology for the library security and embrace open source software in their institutions. Design/methodology/approach The paper describes the author’s practical experiences regarding implementation of the RFID system and integration of middleware RFID software with library management software. Findings From the present study, it was found that the library staff are having a positive attitude toward embracing RFID technology in their library. The present implementation of RFID technology in the studies area gives a clear picture about integrating a third-party software/tool like RFID to the existing systems and how the new system has helped the library to provide better service to their users Research limitations/implications There were some teething problems at the start between the Koha ILMS SIP2 software and the RFID system. The main issue faced while integration was with setting up the hostname, integrating the instance (i.e. database) and with setting up the port. Practical implications This paper will help librarians to implement RFID technology in a practical way to their libraries. The author implemented Koha ILMS with RFID system at the Central Library, Fakiragram College within 1 month and the author migrated data from common communication format (CCF) format to MARC 21 formats. CCF is basically used in SOUL 2.0 developed by INFLIBNET. Originality/value This study discusses issues and possible solutions in the process of implementing RFID applications for two innovative applications in library services. This will influence library professionals to learn Koha ILMS and RFID technology implement it in their libraries.
APA, Harvard, Vancouver, ISO, and other styles
36

Sudarto, Ferry, Gustasari Gustasari, and Arwan Arwan. "PERANCANGAN SISTEM SMARTCARD SEBAGAI PENGAMAN PINTU MENGGUNAKAN RFID BERBASIS ARDUINO." CCIT Journal 10, no. 2 (August 8, 2017): 239–54. http://dx.doi.org/10.33050/ccit.v10i2.544.

Full text
Abstract:
Along with the development of science and technology so rapidly trigger the emergence of new technologies, one of which is RFID. RFID (Radio Frequency Identification) is a process of identifying the object or objects using radio transmission frequency. RFID is a new technology, and will continue to evolve in line with advances in integrated circuit technology, it can be ascertained that the RFID tag can be applied in various fields. RFID systems offer increased efficiency in controlling inventory control in the identification of objects. RFID can be used to store and receive data remotely using a device that RFID TAG (transponder). Many applications can utilize RFID systems, for example for indoor security systems, highways, libraries, class attendance, even as the identity of the student / students. Therefore, in this researchRaharja College presenting a Smartcard System Design using RFID as a device interface and ARDUINO UNO as a controller to be used as a door security system. With the presence of this system is expected to be a useful new innovation in Raharja College and can improve the shortcomings of existing systems and can provide maximum service to the whole personal raharja.
APA, Harvard, Vancouver, ISO, and other styles
37

Chen, Chih Yung, and Jih Fu Tu. "An Implementation Model of RFID Information Security and Privacy." Applied Mechanics and Materials 284-287 (January 2013): 3330–34. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3330.

Full text
Abstract:
The technology of Radio Frequency Identification System (RFID) was being applied to various trade promotions, and Tag is considered to be the next generation of Barcode. However, the RFID is via transmission of radio frequency manner, so hacker could obtain information through the analysis way of frequency signal. The personal privacy will be violated if used in the user's privacy information and transmission without any protective measures to protect. RFID data transmission and storage with hardware ways to achieve the security of information is the best way, but this had been in the problem of Tag costs and capacity. The study taking from the applications ways is to achieve RFID information security and privacy, and do the information securities between the low-cost Tag and the Reader. The study submitted an EPC specification and combined with XOR logical implementation model to achieve privacy by the way of discussion currently. We got the data after simulations to show that XOR computing to 8 bytes actual test, the required time is 17.29 Ticks in average, the spend time is rather short. Follow-up our simulations to the test data of DES encryption methods, an average time of 8,039.41 Ticks is required, the two time required considerable differences.
APA, Harvard, Vancouver, ISO, and other styles
38

Prodanoff, Zornitza Genova, Edward L. Jones, Hongmei Chi, Sherif Elfayoumy, and Cynthia Cummings. "Survey of Security Challenges in NFC and RFID for E-Health Applications." International Journal of E-Health and Medical Communications 7, no. 2 (April 2016): 1–13. http://dx.doi.org/10.4018/ijehmc.2016040101.

Full text
Abstract:
Hospitals worldwide have implemented High Frequency (HF) Radio Frequency Identification (RFID) networks for supplies tracking in ER setting, in-patient identification, surgical instrument management, and other applications. Merging of Web, Near Filed Communication (NFC), and HF RFID technologies for their combined use in e-Health applications is a logical next step due to the wide availability of NFC-enabled smartphones. This article outlines some resulting security challenges. Tags are often compliant with multiple standards that operate in the same frequency range. For example, HF RFID tags have already been adopted for in-patient tracking, yet smartphone NFC reader apps can freely access data on those tags. While tag– or session–centered security protocols exist for some RFID standards (e.g. ISO/IEC 29167), no ISO security standard is currently available for HF RFID tags. In such systems, proper traffic characterization can lead to better understanding of operation under “normal” system state conditions and could potentially help to identify security breaches.
APA, Harvard, Vancouver, ISO, and other styles
39

Rahman, Labonnah Farzana, Lubna Alam, Mohammad Marufuzzaman, and Ussif Rashid Sumaila. "Traceability of Sustainability and Safety in Fishery Supply Chain Management Systems Using Radio Frequency Identification Technology." Foods 10, no. 10 (September 24, 2021): 2265. http://dx.doi.org/10.3390/foods10102265.

Full text
Abstract:
At present, sustainability and emerging technology are the main issues in any supply chain management (SCM) sector. At the same time, the ongoing pandemic is increasing consumers’ concerns about food safety, processing, and distribution, which should meet sustainability requirements. Thus, supervision and monitoring of product quality with symmetric information traceability are important in fresh food and fishery SCM. Food safety and traceability systems based on blockchain, Internet of Things (IoT), wireless sensor networks (WSN), and radio frequency identification (RFID) provide reliability from production to consumption. This review focuses on RFID-based traceability systems in fisheries’ SCM, which have been employed globally to ensure fish quality and security, and summarizes their advantages in real-time applications. The results of this study will help future researchers to improve consumers’ trust in fisheries SCM. Thus, this review aims to provide guidelines and solutions for enhancing the reliability of RFID-based traceability in food SCM systems so to ensure the integrity and transparency of product information.
APA, Harvard, Vancouver, ISO, and other styles
40

Deng, Miao Lei, Hao Jun Zhang, and Wei Jun Zhu. "Data Desynchronization Attacks on Two Lightweight Security Protocols for the RFID System." Applied Mechanics and Materials 241-244 (December 2012): 2331–34. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2331.

Full text
Abstract:
Radio frequency identification (RFID) systems need security protocols to provide confidentiality, user privacy, mutual authentication and etc. This paper analyze two of the newest RFID security protocols which proposed by Niu et al. and Fu et al. form the security viewpoint of data desynchronization attack. These two lightweight protocols were expected to proposed security protections for the RFID system and safeguard against almost all major attacks. However, we found that these two RFID security protocols were vulnerable to the attack of data desynchronization. Based on strand space model, data desynchronization attacks on these two protocols were analyzed. Furthermore, improvements to overcome the security vulnerabilities of these two protocols were given.
APA, Harvard, Vancouver, ISO, and other styles
41

Khalid, Madiha, Umar Mujahid, and Muhammad Najam-ul-Islam. "Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks." International Journal of Distributed Sensor Networks 14, no. 8 (August 2018): 155014771879512. http://dx.doi.org/10.1177/1550147718795120.

Full text
Abstract:
Internet of Things is one of the most important components of modern technological systems. It allows the real time synchronization and connectivity of devices with each other and with the rest of the world. The radio frequency identification system is used as node identification mechanism in the Internet of Thing networks. Since Internet of Things involve wireless channel for communication that is open for all types of malicious adversaries, therefore many security protocols have been proposed to ensure encryption over wireless channel. To reduce the overall cost of radio frequency identification enabled Internet of Thing network security, the researchers use simple bitwise logical operations such as XOR, AND, OR, and Rot and have proposed many ultralightweight mutual authentication protocols. However, almost all the previously proposed protocols were later found to be vulnerable against several attack models. Recently, a new ultralightweight mutual authentication protocol has been proposed which involves only XOR and Rotation functions in its design and claimed to be robust against all possible attack models. In this article, we have performed cryptanalysis of this recently proposed ultralightweight mutual authentication protocol and found many pitfalls and vulnerabilities in the protocol design. We have exploited weak structure of the protocol messages and proposed three attacks against the said protocol: one desynchronization and two full disclosure attacks.
APA, Harvard, Vancouver, ISO, and other styles
42

Zhu, Feng, Peng Li, He Xu, and Ruchuan Wang. "A Lightweight RFID Mutual Authentication Protocol with PUF." Sensors 19, no. 13 (July 4, 2019): 2957. http://dx.doi.org/10.3390/s19132957.

Full text
Abstract:
Radio frequency identification is one of the key techniques for Internet of Things, which has been widely adopted in many applications for identification. However, there exist various security and privacy issues in radio frequency identification (RFID) systems. Particularly, one of the most serious threats is to clone tags for the goal of counterfeiting goods, which causes great loss and danger to customers. To solve these issues, lots of authentication protocols are proposed based on physical unclonable functions that can ensure an anti-counterfeiting feature. However, most of the existing schemes require secret parameters to be stored in tags, which are vulnerable to physical attacks that can further lead to the breach of forward secrecy. Furthermore, as far as we know, none of the existing schemes are able to solve the security and privacy problems with good scalability. Since many existing schemes rely on exhaustive searches of the backend server to validate a tag and they are not scalable for applications with a large scale database. Hence, in this paper, we propose a lightweight RFID mutual authentication protocol with physically unclonable functions (PUFs). The performance analysis shows that our proposed scheme can ensure security and privacy efficiently in a scalable way.
APA, Harvard, Vancouver, ISO, and other styles
43

Xie, Yi, and Dong Wang. "An Item-Level Access Control Framework for Inter-System Security in the Internet of Things." Applied Mechanics and Materials 548-549 (April 2014): 1430–32. http://dx.doi.org/10.4028/www.scientific.net/amm.548-549.1430.

Full text
Abstract:
The IOT(Internet of Things) is thriving to connect everything on our planet. With the maturity of Radio Frequency Identification technology, companies are adopting RFID technology into their legacy systems. However, systems of different companies are facing obstacles in establishing mutual trust to be partners of the IOT. This paper proposes an item-level access control framework for inter-system security in the IOT, promising to help solve the issue and drive the development of the IOT a step forward.
APA, Harvard, Vancouver, ISO, and other styles
44

Figueroa Lorenzo, Santiago, Javier Añorga Benito, Pablo García Cardarelli, Jon Alberdi Garaia, and Saioa Arrizabalaga Juaristi. "A Comprehensive Review of RFID and Bluetooth Security: Practical Analysis." Technologies 7, no. 1 (January 24, 2019): 15. http://dx.doi.org/10.3390/technologies7010015.

Full text
Abstract:
The Internet of Things (IoT) provides the ability to digitize physical objects into virtual data, thanks to the integration of hardware (e.g., sensors, actuators) and network communications for collecting and exchanging data. In this digitization process, however, security challenges need to be taken into account in order to prevent information availability, integrity, and confidentiality from being compromised. In this paper, security challenges of two broadly used technologies, RFID (Radio Frequency Identification) and Bluetooth, are analyzed. First, a review of the main vulnerabilities, security risk, and threats affecting both technologies are carried out. Then, open hardware and open source tools like: Proxmark3 and Ubertooth as well as BtleJuice and Bleah are used as part of the practical analysis. Lastly, risk mitigation and counter measures are proposed.
APA, Harvard, Vancouver, ISO, and other styles
45

Hamada, Louiza, Pascal Lorenz, and Marc Gilg. "Security Challenges for Light Emitting Systems." Future Internet 13, no. 11 (October 28, 2021): 276. http://dx.doi.org/10.3390/fi13110276.

Full text
Abstract:
Although visible light communication (VLC) channels are more secure than radio frequency channels, the broadcast nature of VLC links renders them open to eavesdropping. As a result, VLC networks must provide security in order to safeguard the user’s data from eavesdroppers. In the literature, keyless security techniques have been developed to offer security for VLC. Even though these techniques provide strong security against eavesdroppers, they are difficult to deploy. Key generation algorithms are critical for securing wireless connections. Nonetheless, in many situations, the typical key generation methods may be quite complicated and costly. They consume scarce resources, such as bandwidth. In this paper, we propose a novel key extraction procedure that uses error-correcting coding and one time pad (OTP) to improve the security of VLC networks and the validity of data. This system will not have any interference problems with other devices. We also explain error correction while sending a message across a network, and suggest a change to the Berlekamp–Massey (BM) algorithm for error identification and assessment. Because each OOK signal frame is encrypted by a different key, the proposed protocol provides high physical layer security; it allows for key extraction based on the messages sent, so an intruder can never break the encryption system, even if the latter knows the protocol with which we encrypted the message; our protocol also enables for error transmission rate correction and bit mismatch rates with on-the-fly key fetch. The results presented in this paper were performed using MATLAB.
APA, Harvard, Vancouver, ISO, and other styles
46

Mi, Siya, Zechuan Zhang, Yu Zhang, and Aiqun Hu. "A Non-Destructive Method for Hardware Trojan Detection Based on Radio Frequency Fingerprinting." Electronics 11, no. 22 (November 17, 2022): 3776. http://dx.doi.org/10.3390/electronics11223776.

Full text
Abstract:
Hardware Trojans (HTs) pose a security threat to the Internet of Things (IoT). Attackers can take control of devices in IoT through HTs, which seriously jeopardize the security of many systems in transportation, finance, healthcare, etc. Since subtle differences in the circuit are reflected in far-field signals emitted by the system, the detection of HT status can be performed by monitoring the radio frequency fingerprinting (RFF) of the transmitting signals. For the detection of HTs, a non-destructive detection method based on RFF is proposed in this paper. Based on the proposed method, the detection of HTs can be achieved without integrating additional devices in the receiver, which reduces associated costs and energy consumption. QPSK and triangular-wave signals are measured and identified via experimentation, and the results validate the proposed method. For identifying the presence and operating state of Trojan, the average accuracy achieved measures as high as 98.7%. Notably, with regard to capturing the moment of Trojan activation in the AES encryption circuit, the accuracy of the proposed method is 100% and can provide warning of the threat in a timely manner.
APA, Harvard, Vancouver, ISO, and other styles
47

Zhu, Feng, Peng Li, He Xu, and Ruchuan Wang. "A Novel Lightweight Authentication Scheme for RFID-Based Healthcare Systems." Sensors 20, no. 17 (August 27, 2020): 4846. http://dx.doi.org/10.3390/s20174846.

Full text
Abstract:
The Internet of Things (IoT) has been integrated into legacy healthcare systems for the purpose of improving healthcare processes. As one of the key technologies of IoT, radio frequency identification (RFID) technology has been applied to offer services like patient monitoring, drug administration, and medical asset tracking. However, people have concerns about the security and privacy of RFID-based healthcare systems, which require a proper solution. To solve the problem, recently in 2019, Fan et al. proposed a lightweight RFID authentication scheme in the IEEE Network. They claimed that their scheme can resist various attacks in RFID systems with low implementation cost, and thus is suitable for RFID-based healthcare systems. In this article, our contributions mainly consist of two parts. First, we analyze the security of Fan et al.’s scheme and find out its security vulnerabilities. Second, we propose a novel lightweight authentication scheme to overcome these security weaknesses. The security analysis shows that our scheme can satisfy the necessary security requirements. Besides, the performance evaluation demonstrates that our scheme is of low cost. Thus, our scheme is well-suited for practical RFID-based healthcare systems.
APA, Harvard, Vancouver, ISO, and other styles
48

Mulyana, Dadang Iskandar, Anisah Wulandari, Fahmi Nurul Huda, Reyga Ferdiansyah Putra, and Reza Wanandi. "Implementasi Sistem Keamanan RFID pada Lingkungan Rukun Warga 015 Tegal Alur Jakarta Barat." Jurnal Pengabdian Nasional (JPN) Indonesia 4, no. 1 (January 10, 2023): 230–37. http://dx.doi.org/10.35870/jpni.v4i1.150.

Full text
Abstract:
Safety is an important aspect of life, especially for communities. The lack of security systems in an environment increases crime rates in areas run by people outside the environment. Therefore, the community service team created an environmental security system by creating a security system using RFID (Radio Frequency Identification) and demonstrated the advantages of this security system compared to traditional systems. The joint concept of community service and research activities uses the results of an interview with the head of his RW 015 Kelurahan Tegal Alur in West Jakarta to identify the desire of residents, especially environmental security members, to develop a security system in the RW area. It will come true. We hope to have a better and simpler security system its usefulness. The outcome of this activity will be implemented to residents of RW 015 Tegal Alur West Jakarta as an example of technology-based environmental facility.
APA, Harvard, Vancouver, ISO, and other styles
49

Niveditha, V. R., D. Usha, P. S. Rajakumar, B. Dwarakanath, and Magesh S. "Emerging 5G IoT Smart System Based on Edge-to-Cloud Computing Platform." International Journal of e-Collaboration 17, no. 4 (October 2021): 122–31. http://dx.doi.org/10.4018/ijec.2021100109.

Full text
Abstract:
Security over internet communication has now become difficult as technology is increasingly more effective and faster, particularly in resource limited devices such as wireless sensors, embedded devices, internet of things (IoT), radio frequency identification (RFID) tags, etc. However, IoT is expected to connect billions of computers as a hopeful technology for the future. Hence, security, privacy, and authentication services must protect the communication in IoT. There are several recent considerations, such as restricted computing capacity, register width, RAM size, specific operating environment, ROM size, etc. that have compelled IoT to utilize conventional measures of security. These technologies require greater data speeds, high throughput, expanded power, lower bandwidth, and high efficiency. In addition, IoT has transformed the world in light of these new ideas by offering smooth communication between heterogeneous networks (HetNets).
APA, Harvard, Vancouver, ISO, and other styles
50

Ahmad, Muhammad Baballe, and Fatima Alkasim Nababa. "A comparative study on radio frequency identification system and its various applications." International Journal of Advances in Applied Sciences 10, no. 4 (December 1, 2021): 392. http://dx.doi.org/10.11591/ijaas.v10.i4.pp392-398.

Full text
Abstract:
<span>The radio frequency identification (RFID), is a wireless technology system that is used for identifying an individual or objects through the means of radio waves that transfer information from an electronic tag, called an RFID tag. RFID consists of two main components the interrogator and the transponder. The Interrogator, which is the RFID reader, the interrogator usually transmits and receives the signal while the transponder that is the tag, is attached to the object. In the RFID system, an RFID reader interrogates the RFID tags. This tag reader generates a radio frequency interrogation, which communicates with the tags been registered in the system. This reader likewise has a receiver that captures a reply signal generated from the tags and decodes the signal. This reply signal from the tags reflects the tag's information content. Each tag of the employee or student consists of a unique identity, identification card (ID) that is assigned to a single employee or student ID card, which is recorded, in the database of the system. This research reviews some recent designs and implementation of internet of things (IoT) attendance systems using the concept of the RFID system. The analysis found that the RFID system is a very advanced technology for an automatic attendance system in an institution, organization, or university and it provides a very higher performance and accuracy than the traditional paper-based system that the employees or students normally used to sign. The use of the RFID technology enables the institution, authorities, or management to evade attendance documents from damages such as misplacement, tear, or even got lost. A combination of the model is needed which will confirm higher security, better performance, and consistency of the system.</span>
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography