Multilevel Security Protocol using RFID
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 2
Abstract
Though RFID provides automatic object identification, yet it is vulnerable to various security threats that put consumer and organization privacy at stake. In this work, we have considered some existing security protocols of RFID system and analyzed the possible security threats at each level. We have modified those parts of protocol that have security loopholes and thus finally proposed a modified four-level security model that has the potential to provide fortification against security threats.
Authors and Affiliations
Syed Faiazuddin , S. Venkat Rao , S. C. V. Ramana Rao , M. V. Sainatha Rao , P. Sathish Kumar
Hybrid Method and Similarity to Recognize Javanese Keris
This paper describes Hybrid method and Similarity for recoginizing Javanese Keris. Javanese Keris is one of traditional javanese weapon. It is one of the Indonesia Cultural Heritage. Keris is famous for its distinctive w...
SSH Honeypot: Building, Deploying and Analysis
This article is set to discuss the various techniques that can be used while developing a honeypot, of any form, while considering the advantages and disadvantages of these very different methods. The foremost aims are t...
Performance Analysis of Artificial Neural Networks Training Algorithms and Transfer Functions for Medium-Term Water Consumption Forecasting
Artificial Neural Network (ANN) is a widely used machine learning pattern recognition technique in predicting water resources based on historical data. ANN has the ability to forecast close to accurate prediction given t...
Reducing Attributes in Rough Set Theory with the Viewpoint of Mining Frequent Patterns
The main objective of the Attribute Reduction problem in Rough Set Theory is to find and retain the set of attributes whose values vary most between objects in an Information System or Decision System. Besides, Mining Fr...
Improving TCP Throughput Using Modified Packet Reordering Technique (MPRT) Over Manets
At the beginning of development of network technology TCP transport agent were designed assuming that communication is using wired network, but recently there is huge demand and use of wireless networks for communication...