6 research outputs found

    A Secure Mutual Authentication Protocol for Low-Cost RFID System

    Get PDF

    The Study of RFID Authentication Protocols and Security of Some Popular RFID Tags

    Get PDF

    Cryptographic Approaches To Security and Privacy Issues In Pervasive Computing

    Get PDF
    Technological innovation has enabled tiny devices to participate in pervasive com- puting. Such devices are particularly vulnerable to security and privacy threats, because of their limited computing resources and relatively weak physical security. We investigate possible cryptographic solutions to security and privacy problems arising in two kinds of emerging pervasive computing networks: Personal Area Net- works (PANs) and the EPCglobal Network. A number of key management schemes have been proposed for use in PANs, but these schemes only support key management within a PAN. However, as people are increasingly equipped with multiple wireless devices, PANs are likely to be intercon- nected to share information or services. We introduce a term, iPANs, to name such interconnected PANs. We define system models and design goals for key manage- ment in iPANs, and propose a novel security initialisation scheme for use in iPANs. The proposed scheme achieves desirable security and efficiency properties by making use of the unique characteristics of PANs. The EPCglobal Network is designed to give efficiency and cost savings in and beyond the supply chain using Radio Frequency Identification (RFID) technology; however, privacy threats affecting such networks are particularly serious. We construct a formal privacy model for RFID systems accurately reflecting adversarial threats and power. We then give brief privacy analysis for the existing privacy-enhanced RFID schemes which have received wide attention in the literature. We then construct a secure refresh-based RFID system based on re-encryption techniques, and prove its privacy using the defined privacy model. Finally, we show that the proposed scheme can greatly enhance the security and privacy of EPC tags, making the maximum use of given tag functionalities as specified in the standards

    RFID Sensor-Driven Structural Condition Monitoring in Integrated Building Information Modeling Environment

    Get PDF
    Steel structures are very popular structural forms for both buildings and bridges. Under extreme loading such as strong earthquakes or winds, structural members in steel structures could fail in buckling or yielding. In buildings, structural members are often hidden behind fire-proof coating and drywall, and thus buckling or yielding in steel members are very difficult to detect, often requiring removal of coverings and thus time consuming and costly. Fast and accurate assessment of damage conditions is important to the occupant safety and uninterrupted use. This research presents a method for integrating Building Information Modeling (BIM) and Radio Frequency Identification (RFID) based wireless strain sensor technologies to enable automated structural condition assessment. BIM can serve as an ideal 4-dimensional graphical computing environment for integrating structural health monitoring (SHM) with management practice, which often involves considerable amounts of sensor data of different modalities and changes of structural condition over time. To detect the exceedence of preset threshold strain levels, this research custom designed a novel breakage-triggered (BT) strain sensor for detection of threshold strain levels. This BT strain sensor uses RFID tag for wireless communication with RFID reader. With a special design, the sensor breaks at pre-set strain level and the connected RFID tag is activated. By altering its configuration to include multiple threshold strain levels, actual strain at the monitored location can be estimated after hazardous events. This system can rapidly identify and locate the spot where pre-set strain or crack has happened and the corresponding structure element of the BIM model is automatically highlighted to provide alert signal. Such damage spots require immediate action after hazardous events such as earthquake or extreme wind. The RFID tag can be scanned from a distance up to several meters by using an RFID reader. This system is highly automated, low power consumption, and low cost. A custom developed middleware was developed to enable automated sensor data entry into BIM environment and thus avoid possible human related errors. The BIM environment allows for capturing, organizing, processing (cleansing, fusion, mining, etc.), visualizing the sensor data from the monitoring system, updating relevant models and running finite element analysis for structural response and reliability computation as well as structural health prognosis. Process (inspection scheme) and work-flow automation can be realized. Therefore, the proposed method would lead to more user-friendly, highly automated and more economical way for structural condition assessment and SHM information management

    Strengthening Class1 Gen2 RFID tags

    No full text
    corecore