Voronoi diagrams—a survey of a fundamental geometric data structure
ACM Computing Surveys (CSUR)
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Soft blocking: flexible blocker tags on the cheap
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
A Scalable and Provably Secure Hash-Based RFID Protocol
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
RFID and the perception of control: the consumer's view
Communications of the ACM - Special issue: RFID
RFID security without extensive cryptography
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
GCCW '06 Proceedings of the Fifth International Conference on Grid and Cooperative Computing Workshops
Antenna Theory: Analysis and Design
Antenna Theory: Analysis and Design
IEEE Transactions on Dependable and Secure Computing
A comparative analysis of artificial neural network technologies in intrusion detection systems
MIV'06 Proceedings of the 6th WSEAS International Conference on Multimedia, Internet & Video Technologies
Towards a new approach of model-based HCI conception
MIV'06 Proceedings of the 6th WSEAS International Conference on Multimedia, Internet & Video Technologies
Data transmission encryption and decryption algorithm in network security
SMO'06 Proceedings of the 6th WSEAS International Conference on Simulation, Modelling and Optimization
DIWED'06 Proceedings of the 6th WSEAS International Conference on Distance Learning and Web Engineering
An efficient authentication protocol for RFID systems resistant to active attacks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
EMAP: an efficient mutual-authentication protocol for low-cost RFID tags
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
SARIF: A novel framework for integrating wireless sensor and RFID networks
IEEE Wireless Communications
Authentication and search mechanism for diffusing RFID-sensor networks
International Journal of Sensor Networks
Hi-index | 0.00 |
To uniquely identify physical objects, Radio Frequency Identification (RFID) systems are used with its limitless possibilities and low cost. RFID is a method of remotely storing and retrieving data using devices called RFID tags. An RFID tag is a small object, such as an adhesive sticker, that can be attached to or incorporated into a product. But with this common scenario involving numerous tags and present in the interrogation zone of a single reader at the same time. RFID is prone to security threat as well, which is the main focus of this paper. In this paper we present an anti-collision protocol existing and applied in the RFID dilemma, sited vulnerabilities and suggested general security solutions.