Programming .NET Security
RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
The application of RFID on drug safety of inpatient nursing healthcare
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
RFID Application in Hospitals: A Case Study on a Demonstration RFID Project in a Taiwan Hospital
HICSS '06 Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 08
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
The Evolution of RFID Security
IEEE Pervasive Computing
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
IEEE Transactions on Dependable and Secure Computing
RFID and supply chain management: introduction to the special issue
Journal of Theoretical and Applied Electronic Commerce Research
A Framework for Assessing RFID System Security and Privacy Risks
IEEE Pervasive Computing
Cryptanalysis of a New Ultralightweight RFID Authentication Protocol—SASI
IEEE Transactions on Dependable and Secure Computing
Efficient authentication for low-cost RFID systems
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Secure and Serverless RFID Authentication and Search Protocols
IEEE Transactions on Wireless Communications
Security and privacy in RFID and applications in telemedicine
IEEE Communications Magazine
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
A Low-Collision CSMA-Based Active RFID for Tracking Applications
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Certain applications of passive radio frequency identification (RFID), such as those in healthcare where the patient's name, identification or medical record must be stored, require data within a tag to be encrypted. Encrypted data within an RFID tag has the potential to affect the accuracy or time to read/write the data by the reader. The current research measures and analyzes the effects of encryption, distance of read and delay time between two read/write cycles on the accuracy of the read or write function in an RFID infrastructure. The research also measures and evaluates the time to read/write (R/W) data that is encrypted and compares this encrypted data with unencrypted data. The data encryption standard (DES) encryption method is used in this research due to the limitation of the tag. A multi-functional interface has been developed for the user to test the performance using a High Frequency RFID reader. The measurements were repeated 1000 times for each R/W test. The performance of R/W accuracy is not affected in any meaningful way by encryption even though there is an increase in memory requirement from 88 bytes to 128 bytes. The effect of R/W distance shows that the performance decreases with increase in the distance between the reader and the tag. By inserting a small amount of delay time between different cycles, we can get a significant increase up to 100% accuracy for read function. However, the write accuracy is not affected as significantly as the read accuracy. The effect of the encryption on the time to write the data on the tag shows that encrypted data group takes 70-120 milliseconds for the transmission more than the unencrypted data group. We conclude that while the encryption does not have a significant impact on the accuracy of R/W, the distance and cycle delay does. Also, the encrypted data takes longer to write to the tag.