원문정보
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
The limitless possibilities and low cost are the reasons Radio Frequency Identification (RFID) systems are used in a variety of applications to uniquely identify physical objects. The operation of RFID systems often involves a situation in which numerous tags are present in the interrogation zone of a single reader at the same time. And in such and numerous more situations presented RFID is prone to security threat as well, which is the main focus of this paper. This paper presents an anti-collision protocol existing, sited vulnerabilities and suggested general security solutions.
목차
Abstract
1. Introduction
2. RFID (Radio Frequency Identication)
2.1 RFID System Components
2.2 RFID System Interface
3. Related Work
4. Existing Anti-Collision Protocols
6. RFID Standards
6.1 Contactless Integrated Circuit Cards
6.2 RFID in Animals
6.3 Item Management
6.4 Near-Field Communication (NFC)
6.5 Electronic Product Code (EPC)
7. Risks and Threats
8. Proposed Solution
8.1 Kill Command
8.2 The Faraday Cage Approach
8.3 The Active Jamming Approach
8.4 Blocker Tag
8.5 Bill of Rights
8.6 Classic Cryptography
8.7 Schemes Based on Hash Functions
8.8 A Basic PRF Private Authentication Scheme
8.9 Tree-Based Private Authentication and Delegation Tree
8.10 Human Protocols
8.11 Non-Cryptographic Primitives
9. Conclusion
References
1. Introduction
2. RFID (Radio Frequency Identication)
2.1 RFID System Components
2.2 RFID System Interface
3. Related Work
4. Existing Anti-Collision Protocols
6. RFID Standards
6.1 Contactless Integrated Circuit Cards
6.2 RFID in Animals
6.3 Item Management
6.4 Near-Field Communication (NFC)
6.5 Electronic Product Code (EPC)
7. Risks and Threats
8. Proposed Solution
8.1 Kill Command
8.2 The Faraday Cage Approach
8.3 The Active Jamming Approach
8.4 Blocker Tag
8.5 Bill of Rights
8.6 Classic Cryptography
8.7 Schemes Based on Hash Functions
8.8 A Basic PRF Private Authentication Scheme
8.9 Tree-Based Private Authentication and Delegation Tree
8.10 Human Protocols
8.11 Non-Cryptographic Primitives
9. Conclusion
References
저자정보
참고문헌
자료제공 : 네이버학술정보