The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Dalam protokol carian RFID, pembaca menggunakan pertanyaan yang ditetapkan dan bukannya pertanyaan yang tidak ditentukan yang biasa digunakan dalam protokol pengesahan RFID. Disebabkan perbezaan asas ini, teknik yang digunakan dalam protokol pengesahan RFID mungkin tidak sesuai untuk protokol carian RFID. Protokol Tan et al., bagaimanapun, adalah berdasarkan teknik yang digunakan dalam karya terdahulu seperti menggunakan nilai rawak. Dalam kertas kerja ini, kami mencadangkan dua protokol carian RFID, satu berdasarkan ID statik dan satu lagi berdasarkan ID dinamik, kedua-duanya tidak memerlukan langkah tambahan untuk memenuhi keperluan keselamatan protokol RFID. Kami mencapai ini dengan menggunakan kaunter.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Salinan
Sangjin KIM, Jihwan LIM, Jaehong HAN, Heekuck OH, "Efficient RFID Search Protocols Using Counters" in IEICE TRANSACTIONS on Communications,
vol. E91-B, no. 11, pp. 3552-3559, November 2008, doi: 10.1093/ietcom/e91-b.11.3552.
Abstract: In an RFID search protocol, a reader uses a designated query instead of an unspecified query commonly used in RFID authentication protocols. Due to this fundamental difference, techniques used in RFID authentication protocols may not be suitable for RFID search protocols. Tan et al.'s protocol, however, is based on techniques used in previous works such as using random values. In this paper, we propose two RFID search protocols, one based on static ID and the other based on dynamic ID, both which does not require additional measures to satisfy security requirements of RFID protocols. We achieve this by using counters.
URL: https://global.ieice.org/en_transactions/communications/10.1093/ietcom/e91-b.11.3552/_p
Salinan
@ARTICLE{e91-b_11_3552,
author={Sangjin KIM, Jihwan LIM, Jaehong HAN, Heekuck OH, },
journal={IEICE TRANSACTIONS on Communications},
title={Efficient RFID Search Protocols Using Counters},
year={2008},
volume={E91-B},
number={11},
pages={3552-3559},
abstract={In an RFID search protocol, a reader uses a designated query instead of an unspecified query commonly used in RFID authentication protocols. Due to this fundamental difference, techniques used in RFID authentication protocols may not be suitable for RFID search protocols. Tan et al.'s protocol, however, is based on techniques used in previous works such as using random values. In this paper, we propose two RFID search protocols, one based on static ID and the other based on dynamic ID, both which does not require additional measures to satisfy security requirements of RFID protocols. We achieve this by using counters.},
keywords={},
doi={10.1093/ietcom/e91-b.11.3552},
ISSN={1745-1345},
month={November},}
Salinan
TY - JOUR
TI - Efficient RFID Search Protocols Using Counters
T2 - IEICE TRANSACTIONS on Communications
SP - 3552
EP - 3559
AU - Sangjin KIM
AU - Jihwan LIM
AU - Jaehong HAN
AU - Heekuck OH
PY - 2008
DO - 10.1093/ietcom/e91-b.11.3552
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E91-B
IS - 11
JA - IEICE TRANSACTIONS on Communications
Y1 - November 2008
AB - In an RFID search protocol, a reader uses a designated query instead of an unspecified query commonly used in RFID authentication protocols. Due to this fundamental difference, techniques used in RFID authentication protocols may not be suitable for RFID search protocols. Tan et al.'s protocol, however, is based on techniques used in previous works such as using random values. In this paper, we propose two RFID search protocols, one based on static ID and the other based on dynamic ID, both which does not require additional measures to satisfy security requirements of RFID protocols. We achieve this by using counters.
ER -