5 research outputs found

    An Gen2 Based Security Authentication Protocol for RFID System

    Get PDF
    AbstractEPC Class-1 Generation-2 specification(Gen2 in brief) has been accepted as the standard for RFID tags under grant number ISO18000-6C. However, Gen2 does not pay due attention to security. For this reason, a Gen2 based security authentication protocol is developed in this paper. In details, we study the security requirements presented in the current Gen2 based RFID authentication protocols[7–13]. Then we point out the security flaws of Chien's mutual authentication protocol[7], and improve the protocol based on a 11 security requirements. Our improved protocol merely uses CRC and PRNG operations supported by Gen2 and meets the 11 security requirements. In contrast to the similar work [14,15] on Chien's protocol or other Gen2 based schemes, our protocol is more secure and our security analysis is much more comprehensive and qualitative

    In search of the radio frequency identification (RFID) implementation framework : lessons from the United Kingdom's public sector

    Get PDF
    This study presents a normative framework of the RFID implementation process in the UK public sector. It was motivated by the lack of socio-technical studies on the RFID implementation process in the UK public sector and the need for existing and potential RFID project managers to have an implementation model which could guide their effort in implementing any RFID initiatives in the sector. The study has been conducted through a combination of case study research and grounded theory research approach. Primary data have been collected from the in-depth interviews conducted with the RFID project managers from seven public sector organisations, i.e., five libraries and two hospitals. The analyses of the data were in two main stages. The first stage involved the analysis of the RFID implementation process in each of the organisations and the second stage involved a cross analysis of the RFID implementation process across the entire organisations. Potential contribution towards the existing body of knowledge on RFID implementation was in the form of a normative framework of RFID implementation process in the public sector. This framework describes the main and sub activities in the implementation process, and illustrates the dissimilarities and similarities between the implementation processes. Consequently, the implications of the study to the existing and potential RFID project managers in the public sector and also to the study of information system and RFID implementation are discussed.EThOS - Electronic Theses Online ServiceGBUnited Kingdo
    corecore