2011 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT) 2011
DOI: 10.1109/aeect.2011.6132520
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and security for RFID Access Control Systems: RFID Access Control Systems without back-end database

Abstract: Radio Frequency Identification (RFID) is one of the most popular Automatic Identification and Data Capture (AIDC) technologies that facilitate objects identification and information exchange over relatively small and widely separated entities. In this paper, the main aim is to address the privacy and security challenges that RFID Access Control Systems face and solve these challenges without relying on back-end database but only the RF subsystem.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 9 publications
(13 citation statements)
references
References 11 publications
0
13
0
Order By: Relevance
“…In this work, we continue to build on our previous research , in which we proposed an RFID access control system that dispense the use of backend database and rely on the RF subsystem to perform access control functionalities. The RFID tag serves as a memory dump to store encrypted access control information.…”
Section: Previous Designmentioning
confidence: 99%
See 3 more Smart Citations
“…In this work, we continue to build on our previous research , in which we proposed an RFID access control system that dispense the use of backend database and rely on the RF subsystem to perform access control functionalities. The RFID tag serves as a memory dump to store encrypted access control information.…”
Section: Previous Designmentioning
confidence: 99%
“…Moreover, it maintains a list of tag identifiers that are in online mode. Data stored on tags and readers are encrypted using a symmetric cipher function as described in . Cryptographic operations are performed on the reader side using either hardware or software implementation.…”
Section: Proposed Designmentioning
confidence: 99%
See 2 more Smart Citations
“…Radio frequency identification authentication is a basic method to guarantee security and privacy for an RFID system. If a tag is identified without being authenticated, attackers will be feasible to forge the tag's messages or to replay previous messages, pretending that the tagged object (e.g., an identification smartcard) is present.…”
Section: Introductionmentioning
confidence: 99%