Nothing Special   »   [go: up one dir, main page]

Huo et al., 2013 - Google Patents

A framework to securing RFID transmissions by varying transmitted reader's power

Huo et al., 2013

View PDF
Document ID
15008891177025179990
Author
Huo F
Yang C
Gong G
Poovendran R
Publication year
Publication venue
Radio Frequency Identification System Security

External Links

Snippet

RFID technology has gained tremendous popularity in the recent years. The tiny, inexpensive RFID tags can be easily attached to objects for seamless identification. However, one glaring weakness of RFID tags, especially passive RFID tags is its lack of …
Continue reading at labs.ece.uw.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/001Modulated-carrier systems using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B13/00Transmission systems characterised by the medium used for transmission, not provided for in groups H04B3/00 - H04B11/00

Similar Documents

Publication Publication Date Title
Cho et al. Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol
Chattha NFC—Vulnerabilities and defense
Saad et al. On the physical layer security of backscatter wireless systems
Abd Allah Strengths and weaknesses of near field communication (NFC) technology
Castelluccia et al. Noisy tags: A pretty good key exchange protocol for RFID tags
Yoon Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard
US20070177738A1 (en) Secure two-way RFID communications
Soderi et al. Physical layer security based on spread‐spectrum watermarking and jamming receiver
US20100033305A1 (en) Method and System for Secure Communication
US20110084796A1 (en) Method and system for secure rfid communication between a noisy reader and a communicating object
CA2825741A1 (en) Guard spot beams to deter satellite-based authentication system spoofing
Huo et al. A framework to securing RFID transmissions by varying transmitted reader's power
Jin et al. Secure inductive-coupled near field communication at physical layer
Kavya et al. Vulnerability analysis and security system for NFC-enabled mobile phones
Ranasinghe et al. Confronting security and privacy threats in modern RFID systems
Hu et al. Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization
Chai Design and analysis of security schemes for low-cost RFID systems
Wang Information security vulnerabilities of NFC technology and improvement programs
Chai et al. BUPLE: securing passive RFID communication through physical layer enhancements
Van Huynh et al. Defeating eavesdroppers with ambient backscatter communications
Albahar et al. A Novel Method for Bluetooth pairing using Steganography
Salunke et al. Comprehensive threat analysis and activity modelling of physical layer attacks in internet of things
Hancke Noisy carrier modulation for HF RFID
Hu et al. Device synchronisation: a practical limitation on reader assisted jamming methods for RFID confidentiality
Gorjón et al. Protecting against relay attacks forging increased distance reports