Security Issues of a Recent RFID Multi Tagging Protocol
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 1
Abstract
RFID is now a widespread method used for identifying people and objects. But, not all communication protocols can provide the same rigorous confidentiality to RFID technology. In return, unsafe protocols put individuals and organizations into jeopardy. In this paper, a scheme that uses multiple low cost tags for identifying a single object is studied. Through algebraic analysis on chronologically ordered messages, the proposed multi tag arrangement is shown to fail to provide the claimed security. The weaknesses are discussed and previously proven precautions are recommended to increase the security of the protocol, and thus the safety of its users.
Authors and Affiliations
Mehmet Özcanhan, Sezer Baytar, Semih Utku, Gökhan Dalkiliç
Improving and Extending Indoor Connectivity Using Relay Nodes for 60 GHz Applications
A 60 GHz wireless system can provide very high data rates. However, it has a tremendous amount of both Free Space Path Loss (FSPL) and penetration loss. To mitigate these losses and extend the system range; we propose te...
Energy Efficient Routing Protocol for Maximizing the Lifetime in Wsns Using Ant Colony Algorithm and Artificial Immune System
Energy limitations have become fundamental challenge for designing wireless sensor networks. Network lifetime represent the most important and interested metric. Several attempts have been made for efficient utilization...
A Novel Approach for Submission of Tasks to a Data Center in a Virtualized Cloud Computing Environment
The submission of tasks to a data center plays a crucial role to achieve the services like scheduling, processing in a cloud computing environment. Energy consumption of a data center must be considered for task processi...
Growth Characteristics of Age and Gender-based Anthropometric Data from Human Assisted Remote Healthcare System
Growth monitoring and promotion of optimal growth are essential components of primary health care. The most popular approach to this topic has been developed and utilized for decades by the CDC (Center for Disease Contro...
Modified Graph-theoretic Clustering Algorithm for Mining International Linkages of Philippine Higher Education Institutions
Graph-theoretic clustering either uses limited neighborhood or construction of a minimum spanning tree to aid the clustering process. The latter is challenged by the need to identify and consequently eliminate inconsiste...