Multilevel Security Protocol using RFID

被引:0
作者
Faiazuddin, Syed [1 ]
Rao, S. Venkat [2 ]
Rao, S. C. V. Ramana [3 ]
Rao, M. V. Sainatha [4 ]
Kumar, P. Sathish [5 ]
机构
[1] SKTRM Coll Engn & Tech, Dept CSE, Kondair, AP, India
[2] SRK PG Coll, Dept MCA, Nandyal, AP, India
[3] RGM Engn & Tech, Dept CSE, Nandyal, AP, India
[4] RGM Engn & Tech, Dept IT, Nandyal, AP, India
[5] SVIST, Dept CSE, Madanapalle, AP, India
关键词
RFID; Eavesdropping; Slotted ID; Spoofing; Tracking;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Though RFID provides automatic object identification, yet it is vulnerable to various security threats that put consumer and organization privacy at stake. In this work, we have considered some existing security protocols of RFID system and analyzed the possible security threats at each level. We have modified those parts of protocol that have security loopholes and thus finally proposed a modified four-level security model that has the potential to provide fortification against security threats.
引用
收藏
页码:129 / 133
页数:5
相关论文
共 50 条
  • [41] RFID Security Protocol Trace Attack and Desynchronizing Attack Deep Research
    Gao, Lijun
    Ma, Maode
    Shu, Yantai
    Liu, Chunfeng
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 918 - 922
  • [42] Security and Privacy Analysis of Song-Mitchell RFID Authentication Protocol
    Habibi, Mohammad Hassan
    Aref, Mohammad Reza
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 69 (04) : 1583 - 1596
  • [43] Security of an RFID Based Authentication Protocol with Bitwise Operations for Supply Chain
    Muhammad Arslan Akram
    Adnan Noor Mian
    Wireless Personal Communications, 2022, 126 : 1881 - 1894
  • [44] Security of an RFID Based Authentication Protocol with Bitwise Operations for Supply Chain
    Akram, Muhammad Arslan
    Mian, Adnan Noor
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (02) : 1881 - 1894
  • [45] An Gen2 Based Security Authentication Protocol for RFID System
    Yi, Xiaoluo
    Wang, Liangmin
    Mao, Dongmei
    Zhan, Yongzhao
    INTERNATIONAL CONFERENCE ON APPLIED PHYSICS AND INDUSTRIAL ENGINEERING 2012, PT B, 2012, 24 : 1385 - 1391
  • [46] Security of Grouping-Proof Authentication Protocol for Distributed RFID Systems
    Sun, Da-Zhi
    Mu, Yi
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (02) : 254 - 257
  • [47] A Security-provable Authentication and Key Agreement Protocol in RFID System
    He Lei
    Gan Yong
    Li Na-Na
    Cai Zeng-Yu
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2078 - 2080
  • [48] Security Analysis and Strengthening of an RFID Lightweight Authentication Protocol Suitable for VANETs
    Moradi, Fereidoun
    Mala, Hamid
    Ladani, Behrouz Tork
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 83 (04) : 2607 - 2621
  • [49] RFID Security Issues & Challenges
    Kulkarni, Gurudatt
    Shelke, Rupali
    Sutar, Ramesh
    Mohite, Sangita
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [50] An Improved Lightweight RFID Protocol Using Substring
    He Lei
    Gan Yong
    Cai Zeng-yu
    Li Na-na
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3717 - 3720