21 research outputs found

    Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems

    Get PDF
    The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system

    Third Generation Active RFID from the Locating Applications Perspective

    Get PDF

    Prevention And Detection Mechanism For Security In Passive Rfid System

    Get PDF
    Low-cost radio frequency identification (RFID) tags conforming to the EPCglobal Class-1 Generation-2 standard are inherently insecure due to computational constraints. This thesis proposed the use of both prevention and detection mechanisms to solve the security and privacy issues. A lightweight cryptographic mutual authentication protocol which is resistant to tracking, denial of service (DoS) and replay attacks is proposed as a prevention mechanism. The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). The proposed protocol using 64 bits index is proved having the lowest non-unequivocally identification probability. In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. A GUI is created in a form of JAVA application to display data detected from tag. The proposed protocol implemented in real RFID system outperforms other related protocols because of 13.46 % shorter read time and write time consumed. The system is proved to be able to prevent tracking, DoS, and replay attacks from adversaries with moderate computation requirement compared to other related protocols

    Ethical issues in monitoring and based tracking systems

    Get PDF
    Monitoring and based tracking systems use a variety of technologies to record and monitor the activities of humans. This can increase the risks to the privacy and security of individuals. The amount of information gathered about individuals is growing through the proliferation of surveillance cameras, sensors; microchips and Radio Frequency Identification RFID tags embedded in devices and products. Advances in electronic technologies allow companies and government agencies to store and process large amounts of information about individuals. The Internet provides the ultimate copier device, making this information easily available to millions. This paper highlights the ethical issues emerging with the new technologies in the monitoring and base tracking system. New regulations should be proposed to protect the individual privacy

    Improving RFID read rate reliability by a systemic error detection approach

    Get PDF
    Reliability, security and privacy are the key concerns with RFID (radio frequency identification) adoption. While the mainstream RFID research is focused on solving the security and privacy issues, this paper focuses on addressing the reliability issues in general and detecting read rate failures in particular. We specifically consider the issue of detecting if some RFID tags are not read at all, and if the tags are not read an alarm should be activated. This is quite different from the main stream RFID reliability research which attempts to increase the read rate by developing new and powerful antennas or improving the surrounding environment. To address this issue, we present a novel solution which can detect missed readings and notify appropriate entity to take suitable action against it. The novelty of the proposed solution lies in the combined use of RFID reader along with a normal weighing machine. The concept is to compare the gross weight of the tagged items against the gross weight (of the same items) stored in a backend database. The backed database can only be accessed for those RFID tags which are properly read. If some tags are not read at all these weights would vary and hence incorrect readings could be identified. This paper provides the detailed theoretical foundation for the proposed solution. In addition we compare the proposed solution against existing solutions to demonstrate the success and potential of our solution for practical deployment of RFID in library or supermarket scenario

    A study in integrity of an RFID-monitoring HMSC

    Get PDF
    © 2017 Taylor & Francis Group, LLC. In recent years, trade of Halal foods is spreading at a rapid pace. Additionally, Halal food consumers have become increasingly concerned about the integrity of Halal-food related products in terms of production, transportation and storage along an entire supply chain network as it is important for Halal food products these consumers purchase from supermarkets are truly Halal. These are unlike traditional principles of any other food type. This requires Halal food suppliers who monitor Halal food supply chains to provide adequate information on foods purchased in supermarkets which can be easily accessed by consumers. This article presents a framework in development of a RFID-enabled monitoring system for a Halal meat supply chain network design for enhancing traceability of integrity of Halal meat products. A multi-objective model was developed for investigating an economic feasibility of the proposed RFID-enabled monitoring system. A case study was used for verifying the effectiveness of the developed mathematical model

    Ultra-wide bandwidth backscatter modulation: processing schemes and performance

    Get PDF
    Future advanced radio-frequency identification (RFID) systems are expected to provide both identification and high-definition localization of objects with improved reliability and security while maintaining low power consumption and cost. Ultrawide bandwidth (UWB) technology is a promising solution for next generation RFID systems to overcome most of the limitations of current narrow bandwidth RFID technology, such as reduced area coverage, insufficient ranging resolution for accurate localization, sensitivity to interference, and scarce multiple access capability. In this article, the UWB technology is applied to passive RFID relying on backscatter modulation. A signaling structure with clutter and interference suppression capability is proposed and analyzed. The potential performance is investigated in terms of range/data rate trade-off, clutter suppression, and multiple access capability using experimental data obtained in both the controlled and realistic environments

    Automated Robot for Field Navigation in Multi-Floor Environments

    Get PDF
    In certain situations people need to go some places without having any previous knowledge about the locality. This condition may occur when the place is not visited ever before, or even when there is not any available sources to situate them in the current position. In those cases, the marks of the environment are essential for achieving the area. The same condition may happen for an autonomous machine, i.e., robot. This kind of robots must be talented of solving this problem in a talented way. In order to do this, the robot must use the resources present in their atmosphere. This paper offers a RFID based system, which has been developed to guide and give important information to an autonomous robot. This robot will detect the patient’s abnormal condition and it immediately communicates it to the doctor. This system has been implemented in a real indoor environment and it has been successfully proved in the autonomous and social robot. At the end of the paper, some experimental results, carried out inside the hospital building, are discussed

    Ethical Issues In Monitoring And Based Tracking Systems

    Get PDF
    Monitoring and based tracking systems use a variety of technologies to record and monitor the activities of humans.  This can increase the risks to the privacy and security of individuals. The amount of information gathered about individuals is growing through the proliferation of surveillance cameras, sensors; microchips and Radio Frequency Identification RFID tags embedded in devices and products. Advances in electronic technologies allow companies and government agencies to store and process large amounts of information about individuals. The Internet provides the ultimate copier device, making this information easily available to millions. This paper highlights the ethical issues emerging with the new technologies in the monitoring and base tracking system. New regulations should be proposed to protect the individual privacy. ABSTRAK: Pemantauan dan sistem berasaskan pengesanan menggunakan pelbagai teknologi untuk merakam dan memantau aktiviti manusia. Ini boleh meningkatkan risiko dari segi privasi dan keselamatan individu. Jumlah maklumat yang dikumpulkan tentang individu berkembang melalui proliferasi pengawasan kamera, sensor; mikrocip dan tag frekuensi radio yang diletakkan di dalam peranti dan produk. Kemajuan dalam teknologi elektronik membolehkan syarikat-syarikat dan agensi-agensi kerajaan menyimpan dan memproses sejumlah besar maklumat mengenai individu. Internet menyediakan peranti salinan utama, menjadikan maklumat ini didapati dengan mudah. Kajian ini memaparkan isu-isu etika yang baru muncul dengan teknologi baru dalam pemantauan dan sistem berasaskan pengesanan. Peraturan baru perlu dicadangkan untuk melindungi privasi individu. Keywords: Privacy Implications, Tracking Systems, Ethical Issue, RFI
    corecore