Multilevel Security Protocol using RFID
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 2
Abstract
Though RFID provides automatic object identification, yet it is vulnerable to various security threats that put consumer and organization privacy at stake. In this work, we have considered some existing security protocols of RFID system and analyzed the possible security threats at each level. We have modified those parts of protocol that have security loopholes and thus finally proposed a modified four-level security model that has the potential to provide fortification against security threats.
Authors and Affiliations
Syed Faiazuddin , S. Venkat Rao , S. C. V. Ramana Rao , M. V. Sainatha Rao , P. Sathish Kumar
Defense against SYN Flood Attack using LPTR-PSO: A Three Phased Scheduling Approach
Security has become a critical factor in today’s computation systems. The security threats that risk our confidential information can come in form of seemingly legitimate client request to server. While illegitimate requ...
Semantic, Automatic Image Annotation Based on Multi-Layered Active Contours and Decision Trees
In this paper, we propose a new approach for automatic image annotation (AIA) in order to automatically and efficiently assign linguistic concepts to visual data such as digital images, based on both numeric and semantic...
Resources Management of High Speed Downlink Packet Access Network in the Presence of Mobility
High-Speed Downlink Protocol Access (HSDPA) is a mobile telephony protocol. It is designed to increase data capacity and transfer rate. This paper presents a resource allocation strategy in the HSDPA broadband network. A...
Object Conveyance Algorithm for Multiple Mobile Robots based on Object Shape and Size
This paper describes a determination method of a number of a team for multiple mobile robot object conveyance. The number of robot on multiple mobile robot systems is the factor of complexity on robots formation and moti...
Improved Off-Line Intrusion Detection Using A Genetic Algorithm And RMI
This article proposes an optimization of using Genetic Algorithms for the Security Audit Trail Analysis Problem, which was proposed by L. Me in 1995 and improved by Pedro A. Diaz-Gomez and Dean F. Hougen in 2005. This op...