2 research outputs found

    A Brief Survey of RFID Devices and Its Security Protocols

    Get PDF
    Security plays a very important role during the transmission of information in RFID devices. RFID are the wireless devices that contain a tag and a reader. While there are many authentication protocols put into operation for the security of data starting the tag to the reader. The main purpose of this brief survey is to provide the information of the most related privacy and security protection protocols which applied to Radio Frequency Identification operation. The aim of this paper is to choose to most relevant protocols for RFID devices security. Keywords: RFID, HECC, RSA, AES, ECC

    Efficient Security of RFID Devices using HECC Algorithms and Performance Analysis by Simulation

    Get PDF
    RFID technology is able to be established in the most meadow of our daily life, e.g. personal identification, supply-chain manage­ment, access control etc. Radio Frequency Identification (RFID) is the devices which contain tag and reader which communicated wireless through radio waves.  Hence security of data is most important so that any other unauthorized person cannot be access it. even though there are various method implemented for the protection of data during wireless communication which provides security from different attacks such as DoS, replay, mutual authentication etc. but these techniques are consume large amount of storage space and computation time Here in this paper we proposed a Hyper Elliptic Curve Cryptography (HECC) which provides security from different attacks. Our comprehensive result shows that proposed method is better in conditions of storage space and computation time. Keywords: RFID, HECC, Privacy and Security, Tag, Reader
    corecore