Security Issues of a Recent RFID Multi Tagging Protocol
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 1
Abstract
RFID is now a widespread method used for identifying people and objects. But, not all communication protocols can provide the same rigorous confidentiality to RFID technology. In return, unsafe protocols put individuals and organizations into jeopardy. In this paper, a scheme that uses multiple low cost tags for identifying a single object is studied. Through algebraic analysis on chronologically ordered messages, the proposed multi tag arrangement is shown to fail to provide the claimed security. The weaknesses are discussed and previously proven precautions are recommended to increase the security of the protocol, and thus the safety of its users.
Authors and Affiliations
Mehmet Özcanhan, Sezer Baytar, Semih Utku, Gökhan Dalkiliç
OPTIMIZING THE USE OF AN SPI FLASH PROM IN MICROBLAZE-BASED EMBEDDED SYSTEMS
This paper aims to simplify FPGA designs that incorporate Embedded Software Systems using a soft core Processor. It describes a simple solution to reduce the need of multiple non-volatile memory devices by using one SPI...
Online Reputation Model Using Moving Window
Users are increasingly dependent on decision tools to facilitate their transactions on the internet. Reputation models offer a solution to the users in supporting their purchase decisions. The reputation model takes prod...
An Advanced Technology Selection Model using Neuro Fuzzy Algorithm for Electronic Toll Collection System
Selecting an optimum advanced technology system for an organization is one of the most crucial issues in any industry. Any technology system which makes business process more efficient and business management more...
B2C E-Commerce Fact-Based Negotiation Using Big Data Analytics and Agent-Based Technologies
The focus of this study is application of intelligent agent in negotiation between buyer and seller in B2C Commerce using big data analytics. The developed model is used to conduct negotiations on behalf of prospective b...
Metrics for Event Driven Software
The evaluation of Graphical User Interface has significant role to improve its quality. Very few metrics exists for the evaluation of Graphical User Interface. The purpose of metrics is to obtain better measurements in t...