p.3310
p.3315
p.3320
p.3325
p.3330
p.3335
p.3340
p.3345
p.3352
An Implementation Model of RFID Information Security and Privacy
Abstract:
The technology of Radio Frequency Identification System (RFID) was being applied to various trade promotions, and Tag is considered to be the next generation of Barcode. However, the RFID is via transmission of radio frequency manner, so hacker could obtain information through the analysis way of frequency signal. The personal privacy will be violated if used in the user's privacy information and transmission without any protective measures to protect. RFID data transmission and storage with hardware ways to achieve the security of information is the best way, but this had been in the problem of Tag costs and capacity. The study taking from the applications ways is to achieve RFID information security and privacy, and do the information securities between the low-cost Tag and the Reader. The study submitted an EPC specification and combined with XOR logical implementation model to achieve privacy by the way of discussion currently. We got the data after simulations to show that XOR computing to 8 bytes actual test, the required time is 17.29 Ticks in average, the spend time is rather short. Follow-up our simulations to the test data of DES encryption methods, an average time of 8,039.41 Ticks is required, the two time required considerable differences.
Info:
Periodical:
Pages:
3330-3334
Citation:
Online since:
January 2013
Authors:
Keywords:
Price:
Сopyright:
© 2013 Trans Tech Publications Ltd. All Rights Reserved
Share:
Citation: