1,842 research outputs found

    Security and Privacy in RFID Applications

    Get PDF
    Concerns about privacy and security may limit the deployment of RFID technology and its benefits, therefore it is important they are identified and adequately addressed. System developers and other market actors are aware of the threats and are developing a number of counter measures. RFID systems can never be absolutely secure but effort needs to be made to ensure a proper balance between the risks and the costs of counter measures. The approach taken to privacy and security should depend on the application area and the context of a specific application. In this chapter, we selected and discussed four application areas, but there are many others where privacy and security issues are relevant.JRC.J.4-Information Societ

    The Study on RFID Security Method for Entrance Guard System

    Get PDF
    The RFID technology has been used by industries in recent years, for examples, replacing the traditional two-dimensional barcode, logistics management, military applications, identification. In fact, RFID technology has become one of the new killer technologies. The RFID uses radio frequency to convey information which involves, however, many security problems; Current RFID guidelines do not present solutions to these security problems. The methods put forward in published paper fail to offer complete solutions, either. This study identifies RFID security method for Entrance Guard system. The algorithms used include Hash, AES, random values, XOR four item technology, and use the three-way authentication structure to solve the safety problems of the certification of Entrance Guard system. The experiment showed the algorithms provided better protection on the current RFID systems against attack methods such as Eavesdropping, Traceability, Spoofing and Replay attacking

    Security Analysis of ECC Based Protocols

    Get PDF
    Elliptic curve cryptography (ECC) is extensively used in various multifactor authentication protocols. In this work, various recent ECC based authentication and key exchange protocols are subjected to threat modeling and static analysis to detect vulnerabilities, and to enhance them to be more secure against threats. This work demonstrates how currently used ECC based protocols are vulnerable to attacks. If protocols are vulnerable, damages could include critical data loss and elevated privacy concerns. The protocols considered in thiswork differ in their usage of security factors (e.g. passwords, pins, and biometrics), encryption and timestamps. The threatmodel considers various kinds of attacks including denial of service, man in the middle, weak authentication and SQL injection. Countermeasures to reduce or prevent such attacks are suggested. Beyond cryptanalysis of current schemes and proposal of new schemes, the proposed adversary model and criteria set forth provide a benchmark for the systematic evaluation of future two-factor authentication proposals

    Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements

    Get PDF
    International audienc
    • …
    corecore