|
English
|
正體中文
|
简体中文
|
Items with full text/Total items : 94286/110023 (86%)
Visitors : 21661816
Online Users : 459
|
|
|
Loading...
|
Please use this identifier to cite or link to this item:
http://asiair.asia.edu.tw/ir/handle/310904400/25356
|
Title: | Security Analysis and Improvement of a new Ultra-lightweight RFID Protocol |
Authors: | Xu Zhuang;Zhi-Hui Wang;Chin-Chen Chang;Yan Zhu |
Contributors: | 資訊工程學系 |
Keywords: | RFID;ultra-lightweight;security analysis;permutation;RAPP |
Date: | 2013-07 |
Issue Date: | 2013-07-11 06:18:44 (UTC+0) |
Abstract: | Retrieval of texture images, especially those with different orientation and scale changes, is a challenging and important problem in image analysis. This paper adopts spiking cortical model (SCM) to explore geometrical invariant texture retrieval schemes based on Discrete Cosine Transform (DCT) coefficients of pulse images. The series of pulse images, outputs of SCM, have a robust talent for extracting edge, segment and texture which are inherent in the original images, but they are large 2-dimensional image data so that it is difficult tSome ultra-lightweight RFID protocols have recently been developed. Unlike other RFID protocols, ultra-lightweight protocols generally only need the simplest bitwise operations in the tag side, such as XOR, AND, and OR. In 2012, Tian etal. proposed a new ultra-lightweight RFID protocol named RAPP (RFID authentication protocol with permutation) using a new bitwise operation P ermutation in the protocol, which can achieve high security and privacy as claimed. Unfortunately, because of the incomplete session that might occur in RAPP, we present a replay attack which can lead to de-synchronization between a tag and the database, which means the tag can no longer be authenticated by any reader. In addition, we also present a simple de-synchronization attack that can break the synchronization state between a tag and the database, like the replay attack. Some potential threats resulting in more security concerns from RAPP are illustrated by using two properties of P ermutation revealed in this paper. We also provide some countermeasures for RAPP to withstand attacks mentioned in the paper. |
Relation: | Journal of Information Hiding and Multimedia Signal Processing |
Appears in Collections: | [資訊工程學系] 期刊論文
|
Files in This Item:
File |
Description |
Size | Format | |
index.html | | 0Kb | HTML | 426 | View/Open |
|
All items in ASIAIR are protected by copyright, with all rights reserved.
|