Multilevel Security Protocol using RFID

被引:0
|
作者
Faiazuddin, Syed [1 ]
Rao, S. Venkat [2 ]
Rao, S. C. V. Ramana [3 ]
Rao, M. V. Sainatha [4 ]
Kumar, P. Sathish [5 ]
机构
[1] SKTRM Coll Engn & Tech, Dept CSE, Kondair, AP, India
[2] SRK PG Coll, Dept MCA, Nandyal, AP, India
[3] RGM Engn & Tech, Dept CSE, Nandyal, AP, India
[4] RGM Engn & Tech, Dept IT, Nandyal, AP, India
[5] SVIST, Dept CSE, Madanapalle, AP, India
关键词
RFID; Eavesdropping; Slotted ID; Spoofing; Tracking;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Though RFID provides automatic object identification, yet it is vulnerable to various security threats that put consumer and organization privacy at stake. In this work, we have considered some existing security protocols of RFID system and analyzed the possible security threats at each level. We have modified those parts of protocol that have security loopholes and thus finally proposed a modified four-level security model that has the potential to provide fortification against security threats.
引用
收藏
页码:129 / 133
页数:5
相关论文
共 50 条
  • [1] Mutual Authentication Protocol for RFID Security using NFSR
    Suresh, T.
    Ramakrishnan, M.
    PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2015, : 255 - 259
  • [2] A security protocol for RFID traceability
    Gandino, Filippo
    Montrucchio, Bartolomeo
    Rebaudengo, Maurizio
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (06)
  • [3] Security of an RFID Protocol for Supply Chains
    van Deursen, Ton
    Radomirovic, Sasa
    PROCEEDINGS OF THE ICEBE 2008: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, 2008, : 568 - 573
  • [4] Experimental analysis of an RFID security protocol
    Luo, Zongwei
    Chan, Terry
    Li, Jenny S.
    Wong, Edward
    Cheung, William
    Ng, Victor
    Fok, Wilton
    ICEBE 2006: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2006, : 62 - +
  • [5] A lightweight security authentication protocol for RFID
    Guosheng Zhao
    Hongqi Bao
    Jian Wang
    Peer-to-Peer Networking and Applications, 2025, 18 (3)
  • [6] A Security Protocol Designed with Proxy for RFID
    Zhou Jun
    Xu Yong-jun
    Li Xiao-wei
    2012 WORLD AUTOMATION CONGRESS (WAC), 2012,
  • [7] Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol
    Khan, Muhammad Ayaz
    Ullah, Subhan
    Ahmad, Tahir
    Jawad, Khwaja
    Buriro, Attaullah
    SENSORS, 2023, 23 (12)
  • [8] UltraLightweight MAC protocol for RFID security using Permutation with Double Rotation
    Krishna, Goutham R.
    Sarath, Greeshma
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON TECHNOLOGICAL ADVANCEMENTS IN POWER AND ENERGY (TAP ENERGY): EXPLORING ENERGY SOLUTIONS FOR AN INTELLIGENT POWER GRID, 2017,
  • [9] On the security of RFID anti-counting security protocol (ACSP)
    Safkhani, Masoumeh
    Bagheri, Nasour
    Mahani, Ali
    JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 2014, 259 : 512 - 521
  • [10] Security Enhancement of the Authentication Protocol for RFID Systems
    Lee, Yung-Cheng
    Kuo, Wen-Chung
    Hsieh, Y. -C
    Chen, T-C
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 521 - +