Multilevel Security Protocol using RFID

被引:0
作者
Faiazuddin, Syed [1 ]
Rao, S. Venkat [2 ]
Rao, S. C. V. Ramana [3 ]
Rao, M. V. Sainatha [4 ]
Kumar, P. Sathish [5 ]
机构
[1] SKTRM Coll Engn & Tech, Dept CSE, Kondair, AP, India
[2] SRK PG Coll, Dept MCA, Nandyal, AP, India
[3] RGM Engn & Tech, Dept CSE, Nandyal, AP, India
[4] RGM Engn & Tech, Dept IT, Nandyal, AP, India
[5] SVIST, Dept CSE, Madanapalle, AP, India
关键词
RFID; Eavesdropping; Slotted ID; Spoofing; Tracking;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Though RFID provides automatic object identification, yet it is vulnerable to various security threats that put consumer and organization privacy at stake. In this work, we have considered some existing security protocols of RFID system and analyzed the possible security threats at each level. We have modified those parts of protocol that have security loopholes and thus finally proposed a modified four-level security model that has the potential to provide fortification against security threats.
引用
收藏
页码:129 / 133
页数:5
相关论文
共 50 条
  • [31] Mutual Authentication Security RFID Protocol Based on Time Stamp
    Zhang, Changlun
    Zhang, Wenqi
    Mu, Haibing
    2015 FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE THEORY, SYSTEMS AND APPLICATIONS (CCITSA 2015), 2015, : 166 - 170
  • [32] A Lightweight RFID Authentication Protocol with Forward Security and Randomized Identifier
    Shi, Zhicai
    Wu, Fei
    Wang, Changzhi
    Ren, Shitao
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 1 - 13
  • [33] Security and Privacy Analysis of Song–Mitchell RFID Authentication Protocol
    Mohammad Hassan Habibi
    Mohammad Reza Aref
    Wireless Personal Communications, 2013, 69 : 1583 - 1596
  • [34] Lightweight encryption function structure protection of RFID security protocol
    Dantong, O. (ouyangdantong@163.com), 1600, Advanced Institute of Convergence Information Technology (04): : 155 - 162
  • [35] Security enhancement on an RFID ownership transfer protocol based on cloud
    Lee, Cheng-Chi
    Chen, Shun-Der
    Li, Chun-Ta
    Cheng, Chung-Lun
    Lai, Yan-Ming
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 266 - 277
  • [36] Security and privacy analysis of RFID authentication protocol for ubiquitous computing
    Kim, Hyun-Seok
    Choi, Jin-Young
    PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 1359 - +
  • [37] Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6
    Song, Boyeon
    Hwang, Jung Yeon
    Shim, Kyung-Ah
    IEEE COMMUNICATIONS LETTERS, 2011, 15 (12) : 1375 - 1377
  • [38] A lightweight RFID protocol using substring
    Chien, Hung-Yu
    Huang, Chen-Wei
    EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4808 : 422 - 431
  • [39] Security and Privacy Analysis of Song-Mitchell RFID Authentication Protocol
    Habibi, Mohammad Hassan
    Aref, Mohammad Reza
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 69 (04) : 1583 - 1596
  • [40] RFID Security Protocol Trace Attack and Desynchronizing Attack Deep Research
    Gao, Lijun
    Ma, Maode
    Shu, Yantai
    Liu, Chunfeng
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 918 - 922