An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
RFID: Applications, Security, and Privacy
RFID: Applications, Security, and Privacy
Anti-collision protocol development for passive RFID tags
AIC'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Informatics and Communications - Volume 7
Modeling method of traceability system based on information flow in meat food supply chain
WSEAS Transactions on Information Science and Applications
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Hi-index | 0.00 |
Critical examinations concerning the Radio Frequency Identification security and privacy have determined wide analysis over the time. RFID applications have always assumed two important hierarchies: structures aiming to offer security to RFID systems and structures aiming to offer functionality, with no security issues. A way of creating radio frequency identification systems more secure relies on cryptography. Nine RFID protocols of identification and authentication are examined in this paper, so as to analyze the strong points and to find solutions for the weak or jeopardizing points that threaten the security and privacy of RFID systems. By reaching the best security and privacy solutions, using of RFID systems will bring visibility within developing business strategies or logistics processes, in thoroughly transparency. In many situations, the threatening over RFID structures is the result of designing weak protocols. Presumable attacks on RFID structures are evaluated; important ways of comparison and analysis amongst nine existing protocols are outlined. At the end of each description, solutions of treating the weak points are emphasized.