Multilevel Security Protocol using RFID

被引:0
作者
Faiazuddin, Syed [1 ]
Rao, S. Venkat [2 ]
Rao, S. C. V. Ramana [3 ]
Rao, M. V. Sainatha [4 ]
Kumar, P. Sathish [5 ]
机构
[1] SKTRM Coll Engn & Tech, Dept CSE, Kondair, AP, India
[2] SRK PG Coll, Dept MCA, Nandyal, AP, India
[3] RGM Engn & Tech, Dept CSE, Nandyal, AP, India
[4] RGM Engn & Tech, Dept IT, Nandyal, AP, India
[5] SVIST, Dept CSE, Madanapalle, AP, India
关键词
RFID; Eavesdropping; Slotted ID; Spoofing; Tracking;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Though RFID provides automatic object identification, yet it is vulnerable to various security threats that put consumer and organization privacy at stake. In this work, we have considered some existing security protocols of RFID system and analyzed the possible security threats at each level. We have modified those parts of protocol that have security loopholes and thus finally proposed a modified four-level security model that has the potential to provide fortification against security threats.
引用
收藏
页码:129 / 133
页数:5
相关论文
共 50 条
  • [1] Mutual Authentication Protocol for RFID Security using NFSR
    Suresh, T.
    Ramakrishnan, M.
    PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2015, : 255 - 259
  • [2] A security protocol for RFID traceability
    Gandino, Filippo
    Montrucchio, Bartolomeo
    Rebaudengo, Maurizio
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (06)
  • [3] A Security Protocol Designed with Proxy for RFID
    Zhou Jun
    Xu Yong-jun
    Li Xiao-wei
    2012 WORLD AUTOMATION CONGRESS (WAC), 2012,
  • [4] On the security of RFID anti-counting security protocol (ACSP)
    Safkhani, Masoumeh
    Bagheri, Nasour
    Mahani, Ali
    JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 2014, 259 : 512 - 521
  • [5] Security flaws in a recent RFID delegation protocol
    Erguler, Imran
    Anarim, Emin
    PERSONAL AND UBIQUITOUS COMPUTING, 2012, 16 (03) : 337 - 349
  • [6] Security flaws in a recent RFID delegation protocol
    Imran Erguler
    Emin Anarim
    Personal and Ubiquitous Computing, 2012, 16 : 337 - 349
  • [7] Design and Implementation of A RFID Security Authentication Protocol
    Zhang, Lei
    Xiao, Zicong
    2013 2ND INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION AND MEASUREMENT, SENSOR NETWORK AND AUTOMATION (IMSNA), 2013, : 102 - 105
  • [8] Security flaws in a recent ultralightweight RFID protocol
    Peris-Lopez P.
    Hernandez-Castro J.C.
    Tapiador J.M.E.
    Van Der Lubbe J.C.A.
    Cryptology and Information Security Series, 2010, 4 : 83 - 94
  • [9] On the Security of an ECC Based RFID Authentication Protocol
    Babaheidarian, Parisa
    Delavar, Mahshid
    Mohajeri, Javad
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 111 - 114
  • [10] A Mutual RFID Security Protocol for Wireless Reader
    He Jialiang
    Xu Zhiqiang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 43 - 52