Advanced Science and Technology Letters 2013
DOI: 10.14257/astl.2013.40.24
|View full text |Cite
|
Sign up to set email alerts
|

Requirement of Authentication between RFID tag and Agent for Applying U-healthcare System

Abstract: Abstract.A variety of security and privacy threats to RFID authentication protocols have been widely studied, including eavesdropping, replay attacks, denial of service (DoS) attacks, tracking, and traceability. Considering this RFID security issues, we surveyed the security threats and open problems related to issues by means of information security and privacy. In ubiquitous sensor node, it is possible to collect the data from end node and track patient's location without awareness. Even though, concerns abo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
references
References 7 publications
0
0
0
Order By: Relevance