首页> 外文会议>Mathematical methods, computational techniques, intelligent systems >Comparison of RFID protocols on harmful points that threaten the security and privacy of RFID structures
【24h】

Comparison of RFID protocols on harmful points that threaten the security and privacy of RFID structures

机译:RFID协议在危害RFID结构的安全性和隐私性的有害点上的比较

获取原文
获取原文并翻译 | 示例

摘要

Radio Frequency Identification signifies an advanced wireless technology, which integrates essential solutions within fields of intelligent chips and automation technologies. Analyzing the Radio Frequency Identification applications, one might emphasize two hierarchies: levels aiming to offer security to RFID structures and levels aiming to offer functionality, but no security issues. In this paper, four protocols based on updating the tags' identifiers by using RFID readers will be compared, so as to accomplish an analysis over the harmful points that are threatening the security and privacy of RFID systems. A chaotic matter is brought into discussion, by the following thoughts: to discover what type of identification and authentication protocols are most appropriate on various RFID structures. Analyzing these conditions over RFID protocols of security and privacy has carried out wide approach. An essential matter on establishing and designing the RFID protocols consists in defining their aim.
机译:射频识别标志着一种先进的无线技术,该技术将基本解决方案集成在智能芯片和自动化技术领域。在分析射频识别应用程序时,可能会强调两个层次结构:旨在为RFID结构提供安全性的级别和旨在提供功能性的级别,但是没有安全性问题。本文将比较四种基于使用RFID阅读器更新标签标识符的协议,从而对威胁RFID系统安全性和隐私性的危害点进行分析。通过以下想法来讨论一个混乱的问题:发现哪种类型的标识和身份验证协议最适合各种RFID结构。通过安全性和隐私性的RFID协议分析这些条件已经采取了广泛的方法。建立和设计RFID协议的关键在于确定其目标。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号