New Security Problem in RFID Systems “Tag Killing”

Author(s):  
Dong-Guk Han ◽  
Tsuyoshi Takagi ◽  
Ho Won Kim ◽  
Kyo Il Chung
2013 ◽  
Vol 303-306 ◽  
pp. 2112-2116 ◽  
Author(s):  
Shu Li ◽  
Xi Yang ◽  
Ping Yuan Liang

This article proposed a new security protocol with satisfying the lightweight requirements of the security of RFID system. Using varying identifiers, the protocol can resist Forward attack, Traffic analysis and Tracking attack, Replay attack. The Back-end Server holds the new identifier and last identifier for every Tag can keep database synchronization. Each Tag store a unique Key that is the secret information which also store in the Back-end Server. Use the Key, the protocol can implement mutual authentication between Back-end Server and Tag. Then the paper compared the proposed protocol with the typical protocols in security, effective and cost. The results demonstrate that the protocol can effectively solve the security problem of RFID systems.


Author(s):  
Yong Jin ◽  
Zhentao Hu ◽  
Dongdong Xie ◽  
Guodong Wu ◽  
Lin Zhou

AbstractAiming at high energy consumption and information security problem in the simultaneous wireless information and power transfer (SWIPT) multi-user wiretap network, we propose a user-aided cooperative non-orthogonal multiple access (NOMA) physical layer security transmission scheme to minimize base station (BS) transmitted power in this paper. In this scheme, the user near from BS is adopted as a friendly relay to improve performance of user far from BS. An energy harvesting (EH) technology-based SWIPT is employed at the near user to collect energy which can be used at cooperative stage. Since eavesdropper in the downlink of NOMA system may use successive interference cancellation (SIC) technology to obtain the secrecy information of receiver, to tackle this problem, artificial noise (AN) is used at the BS to enhance security performance of secrecy information. Moreover, semidefinite relaxation (SDR) method and successive convex approximation (SCA) technique are combined to solve the above non-convex problem. Simulation results show that in comparison with other methods, our method can effectively reduce the transmitted power of the BS on the constraints of a certain level of the secrecy rates of two users.


Author(s):  
Honglong Chen ◽  
Xin Ai ◽  
Kai Lin ◽  
Na Yan ◽  
Zhibo Wang ◽  
...  

2021 ◽  
Vol 13 (2) ◽  
pp. 741
Author(s):  
Wirat Krasachat ◽  
Suthathip Yaisawarng

To overcome the challenging food safety and security problem, in 2003, the Thai government initiated ‘Good Agricultural Practices’ (GAP) technology. This paper used a sample of 107 small chili farms from the Chiyaphoom province for the 2012 crop year, and data envelopment analysis (DEA) meta-frontier directional distance function technique to answer two questions: (1) Are GAP-adopting farms, on average, more efficient than conventional farms? (2) Does access to GAP technology affect farmers’ decisions to adopt GAP technology? We also developed an ‘indirect’ approach to reduce the potential sample selection bias for small samples. For the dry-season subsample, GAP farms were more technically efficient when compared with non-GAP farms. These dry-season non-GAP farms may not adopt the GAP method because they have limited access to GAP technology. For the rainy-season subsample, on average, GAP farms were more efficient than non-GAP farms at the 5% level. Access to the GAP technology is not a possible reason for non-GAP rainy season farms to not adopt the GAP technology. To enable sustainable development, government agencies and nongovernmental organizations (NGOs) must develop and implement appropriate educational and training workshops to promote and assist GAP technology adoption for chili farms in Thailand.


Author(s):  
Jiaqi Xu ◽  
Wei Sun ◽  
Kannan Srinivasan

RFID techniques have been extensively used in sensing systems due to their low cost. However, limited by the structural simplicity, collision is one key issue which is inevitable in RFID systems, thus limiting the accuracy and scalability of such sensing systems. Existing anti-collision techniques try to enable parallel decoding without sensing based applications in mind, which can not operate on COTS RFID systems. To address the issue, we propose COFFEE, which enables parallel channel estimation of COTS passive tags by harnessing the collision. We revisit the physical layer design of current standard. By exploiting the characteristics of low sampling rate and channel diversity of RFID tags, we separate the collided data and extract the channels of the collided tags. We also propose a tag identification algorithm which explores history channel information and identify the tags without decoding. COFFEE is compatible with current COTS RFID standards which can be applied to all RFID-based sensing systems without any modification on tag side. To evaluate the real world performance of our system, we build a prototype and conduct extensive experiments. The experimental results show that we can achieve up to 7.33x median time resolution gain for the best case and 3.42x median gain on average.


Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan liu

In the traditional RFID (Radio Frequency IDentification) system, a secure wired channel communication is used between the reader and the server. The newly produced mobile RFID system is different from the traditional RFID system, the communication between the reader and the server is based on a wireless channel, and the authentication protocol is suitable for traditional RFID systems, but it cannot be used in mobile RFID systems. To solve this problem, a mutual authentication protocol MSB (Most Significant Bit) for super lightweight mobile radio frequency identification system is proposed based on bit replacement operation. MSB is a bitwise operation to encrypt information and reduce the computational load of communication entities. Label, readers, and servers authenticate first and then communicate, MSB may be used to resistant to common attacks. The security analysis of the protocol shows that the protocol has high security properties, the performance analysis of the protocol shows that the protocol has the characteristics of low computational complexity, the formal analysis of the protocol based on GNY logic Gong et al. (1990) provides a rigorous reasoning proof process for the protocol.


Sign in / Sign up

Export Citation Format

Share Document