The following information was submitted:
Transactions: WSEAS TRANSACTIONS ON COMMUNICATIONS
Transactions ID Number: 89-758
Full Name: Cristina Hurjui
Position: Ph.D. Candidate
Age: ON
Sex: Female
Address: Universitatea Stefan cel Mare, Facultatea de Inginerie Electrica si Stiinta Calculatoarelor, Corp D,Lab.D011, Str. Universitatii nr.13, cod 720229
Country: ROMANIA
Tel: (+4)0745.393.227
Tel prefix: (+4)0230.522.978
Fax: (+4)0230.524.801
E-mail address: churjui@eed.usv.ro
Other E-mails: hurjui.cristina@gmail.com
Title of the Paper: Quantifying cryptographic techniques in radio frequency identification protocols and ways of remedying the security threats
Authors as they appear in the Paper: Cristina Hurjui,Stefan Holban,Adrian Graur
Email addresses of all the authors: churjui@eed.usv.ro,stefan@aspc.cs.upt.ro,adriang@eed.usv.ro
Number of paper pages: 12
Abstract: Abstract: - Critical examinations concerning the Radio Frequency Identification security and privacy have determined wide analysis over the time. RFID applications have always assumed two important hierarchies: structures aiming to offer security to RFID systems and structures aiming to offer functionality, with no security issues. A way of creating radio frequency identification systems more secure relies on cryptography. Nine RFID protocols of identification and authentication are examined in this paper, so as to analyze the strong points and to find solutions for the weak or jeopardizing points that threaten the security and privacy of RFID systems. By reaching the best security and privacy solutions, using of RFID systems will bring visibility within developing business strategies or logistics processes, in thoroughly transparency. In many situations, the threatening over RFID structures is the result of designing weak protocols. Presumable attacks on RFID str!
uctures are evaluated; important ways of comparison and analysis amongst nine existing protocols are outlined. At the end of each description, solutions of treating the weak points are emphasized.
Keywords: Radio frequency identification,Protocol of identification,Protocol of authentication,Security,Privacy
EXTENSION of the file: .pdf
Special (Invited) Session: Comparison of RFID protocols on harmful points that threaten the security and privacy of RFID structures
Organizer of the Session: 633-561
How Did you learn about congress:
IP ADDRESS: 213.164.255.74