Multilevel Security Protocol using RFID

Abstract

Though RFID provides automatic object identification, yet it is vulnerable to various security threats that put consumer and organization privacy at stake. In this work, we have considered some existing security protocols of RFID system and analyzed the possible security threats at each level. We have modified those parts of protocol that have security loopholes and thus finally proposed a modified four-level security model that has the potential to provide fortification against security threats.

Authors and Affiliations

Syed Faiazuddin , S. Venkat Rao , S. C. V. Ramana Rao , M. V. Sainatha Rao , P. Sathish Kumar

Keywords

Related Articles

Defense against SYN Flood Attack using LPTR-PSO: A Three Phased Scheduling Approach

Security has become a critical factor in today’s computation systems. The security threats that risk our confidential information can come in form of seemingly legitimate client request to server. While illegitimate requ...

Semantic, Automatic Image Annotation Based on Multi-Layered Active Contours and Decision Trees

In this paper, we propose a new approach for automatic image annotation (AIA) in order to automatically and efficiently assign linguistic concepts to visual data such as digital images, based on both numeric and semantic...

Resources Management of High Speed Downlink Packet Access Network in the Presence of Mobility

High-Speed Downlink Protocol Access (HSDPA) is a mobile telephony protocol. It is designed to increase data capacity and transfer rate. This paper presents a resource allocation strategy in the HSDPA broadband network. A...

Object Conveyance Algorithm for Multiple Mobile Robots based on Object Shape and Size

This paper describes a determination method of a number of a team for multiple mobile robot object conveyance. The number of robot on multiple mobile robot systems is the factor of complexity on robots formation and moti...

Improved Off-Line Intrusion Detection Using A Genetic Algorithm And RMI

This article proposes an optimization of using Genetic Algorithms for the Security Audit Trail Analysis Problem, which was proposed by L. Me in 1995 and improved by Pedro A. Diaz-Gomez and Dean F. Hougen in 2005. This op...

Download PDF file
  • EP ID EP129601
  • DOI -
  • Views 85
  • Downloads 0

How To Cite

Syed Faiazuddin, S. Venkat Rao, S. C. V. Ramana Rao, M. V. Sainatha Rao, P. Sathish Kumar (2011). Multilevel Security Protocol using RFID. International Journal of Advanced Computer Science & Applications, 2(2), 129-133. https://europub.co.uk/articles/-A-129601