Multilevel Security Protocol using RFID

被引:0
|
作者
Faiazuddin, Syed [1 ]
Rao, S. Venkat [2 ]
Rao, S. C. V. Ramana [3 ]
Rao, M. V. Sainatha [4 ]
Kumar, P. Sathish [5 ]
机构
[1] SKTRM Coll Engn & Tech, Dept CSE, Kondair, AP, India
[2] SRK PG Coll, Dept MCA, Nandyal, AP, India
[3] RGM Engn & Tech, Dept CSE, Nandyal, AP, India
[4] RGM Engn & Tech, Dept IT, Nandyal, AP, India
[5] SVIST, Dept CSE, Madanapalle, AP, India
关键词
RFID; Eavesdropping; Slotted ID; Spoofing; Tracking;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Though RFID provides automatic object identification, yet it is vulnerable to various security threats that put consumer and organization privacy at stake. In this work, we have considered some existing security protocols of RFID system and analyzed the possible security threats at each level. We have modified those parts of protocol that have security loopholes and thus finally proposed a modified four-level security model that has the potential to provide fortification against security threats.
引用
收藏
页码:129 / 133
页数:5
相关论文
共 50 条
  • [31] An authentication protocol in a security layer for RFID smart tags
    Feldhofer, Martin
    Proc Mediterr Electrotech Conf MELECON, 1600, (759-762):
  • [32] Security Issues of a Recent RFID Multi Tagging Protocol
    Ozcanhan, Mehmet Hilal
    Baytar, Sezer
    Utku, Semih
    Dalkilic, Gokhan
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (01) : 11 - 15
  • [33] An Effective RFID Security Protocol Based on Secret Sharing
    Gao, Zhijian
    Jiang, Yi
    Lin, Zhenxiong
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 780 - 784
  • [34] Vulnerability aware graphs for RFID protocol security benchmarking
    Chang, Shan
    Lu, Li
    Liu, Xiaoqiang
    Song, Hui
    Yao, Qingsong
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2015, 81 (06) : 1027 - 1041
  • [35] A light-weight security protocol for RFID system
    Oh, Jung-Hyun
    Kim, Hyun-Seok
    Choi, Jin-Young
    PERSONAL WIRELESS COMMUNICATIONS, 2007, 245 : 384 - +
  • [36] A High-security RFID Grouping Proof Protocol
    Huang, Ping
    Mu, Haibing
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 35 - 44
  • [37] A kind of RFID Security Protocol Based on the Algorithm of Present
    Gao, Xin
    Lv, Shengqi
    Zhang, Hao
    Li, Xingpeng
    Ji, Weijia
    He, Yang
    Li, Xiaobing
    2018 5TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2018, : 50 - 55
  • [38] Elliptic Curve Signcryption Based Security Protocol for RFID
    Singh, Anuj Kumar
    Patro, B. D. K.
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 344 - 365
  • [39] Authentication Protocol of RFID System Based on Security Policy
    Wang, Guichao
    Wang, Yan
    Li, Yongzhen
    2013 THIRD INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2013, : 1242 - 1246
  • [40] Security Analysis of a Mutual Authentication Protocol for RFID Systems
    Yang, Yuanyuan
    Lu, Zhen
    Chen, Zhuo
    Wei, Xiang
    Gu, Jian
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 252 - 255