Huo et al., 2013 - Google Patents
A framework to securing RFID transmissions by varying transmitted reader's powerHuo et al., 2013
View PDF- Document ID
- 15008891177025179990
- Author
- Huo F
- Yang C
- Gong G
- Poovendran R
- Publication year
- Publication venue
- Radio Frequency Identification System Security
External Links
Snippet
RFID technology has gained tremendous popularity in the recent years. The tiny, inexpensive RFID tags can be easily attached to objects for seamless identification. However, one glaring weakness of RFID tags, especially passive RFID tags is its lack of …
- 230000005540 biological transmission 0 title description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/001—Modulated-carrier systems using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B13/00—Transmission systems characterised by the medium used for transmission, not provided for in groups H04B3/00 - H04B11/00
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cho et al. | Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol | |
Chattha | NFC—Vulnerabilities and defense | |
Saad et al. | On the physical layer security of backscatter wireless systems | |
Abd Allah | Strengths and weaknesses of near field communication (NFC) technology | |
Castelluccia et al. | Noisy tags: A pretty good key exchange protocol for RFID tags | |
Yoon | Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard | |
US20070177738A1 (en) | Secure two-way RFID communications | |
Soderi et al. | Physical layer security based on spread‐spectrum watermarking and jamming receiver | |
US20100033305A1 (en) | Method and System for Secure Communication | |
US20110084796A1 (en) | Method and system for secure rfid communication between a noisy reader and a communicating object | |
CA2825741A1 (en) | Guard spot beams to deter satellite-based authentication system spoofing | |
Huo et al. | A framework to securing RFID transmissions by varying transmitted reader's power | |
Jin et al. | Secure inductive-coupled near field communication at physical layer | |
Kavya et al. | Vulnerability analysis and security system for NFC-enabled mobile phones | |
Ranasinghe et al. | Confronting security and privacy threats in modern RFID systems | |
Hu et al. | Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization | |
Chai | Design and analysis of security schemes for low-cost RFID systems | |
Wang | Information security vulnerabilities of NFC technology and improvement programs | |
Chai et al. | BUPLE: securing passive RFID communication through physical layer enhancements | |
Van Huynh et al. | Defeating eavesdroppers with ambient backscatter communications | |
Albahar et al. | A Novel Method for Bluetooth pairing using Steganography | |
Salunke et al. | Comprehensive threat analysis and activity modelling of physical layer attacks in internet of things | |
Hancke | Noisy carrier modulation for HF RFID | |
Hu et al. | Device synchronisation: a practical limitation on reader assisted jamming methods for RFID confidentiality | |
Gorjón et al. | Protecting against relay attacks forging increased distance reports |