ASIA unversity:Item 310904400/25356
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 94286/110023 (86%)
Visitors : 21664091      Online Users : 748
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/25356


    Title: Security Analysis and Improvement of a new Ultra-lightweight RFID Protocol
    Authors: Xu Zhuang;Zhi-Hui Wang;Chin-Chen Chang;Yan Zhu
    Contributors: 資訊工程學系
    Keywords: RFID;ultra-lightweight;security analysis;permutation;RAPP
    Date: 2013-07
    Issue Date: 2013-07-11 06:18:44 (UTC+0)
    Abstract: Retrieval of texture images, especially those with different orientation and scale changes, is a challenging and important problem in image analysis. This paper adopts spiking cortical model (SCM) to explore geometrical invariant texture retrieval schemes based on Discrete Cosine Transform (DCT) coefficients of pulse images. The series of pulse images, outputs of SCM, have a robust talent for extracting edge, segment and texture which are inherent in the original images, but they are large 2-dimensional image data so that it is difficult tSome ultra-lightweight RFID protocols have recently been developed. Unlike other RFID protocols, ultra-lightweight protocols generally only need the simplest bitwise operations in the tag side, such as XOR, AND, and OR. In 2012, Tian etal. proposed a new ultra-lightweight RFID protocol named RAPP (RFID authentication protocol with permutation) using a new bitwise operation P ermutation in the protocol, which can achieve high security and privacy as claimed. Unfortunately, because of the incomplete session that might occur in RAPP, we present a replay attack which can lead to de-synchronization between a tag and the database, which means the tag can no longer be authenticated by any reader. In addition, we also present a simple de-synchronization attack that can break the synchronization state between a tag and the database, like the replay attack. Some potential threats resulting in more security concerns from RAPP are illustrated by using two properties of P ermutation revealed in this paper. We also provide some countermeasures for RAPP to withstand attacks mentioned in the paper.
    Relation: Journal of Information Hiding and Multimedia Signal Processing
    Appears in Collections:[Department of Computer Science and Information Engineering] Journal Artical

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML429View/Open


    All items in ASIAIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback