Subscribe Now Subscribe Today
Science Alert
 
Blue
   
Curve Top
Information Technology Journal
  Year: 2011 | Volume: 10 | Issue: 10 | Page No.: 1917-1925
DOI: 10.3923/itj.2011.1917.1925
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Prevention of Tampering Attacks in Mobile Radio Frequency Identification Environment

M. Sandhya and T.R. Rangaswamy

Abstract:
This study describes the characteristics of data tampering in RFID-based information systems and a method addressing it is proposed using hashing techniques in mobile RFID environment. The proposed method requires only hash, XOR and simple calculations but can provide good security and privacy protection features. Mobile RFID-enhanced applications (“Mobile RFID”) offer a unique way of interacting with the physical world by using the touch paradigm. They offer an intuitive way to interact with physical objects to which RFID transponders are attached. However, the development of mobile RFID applications is not well supported yet, in contrast to stationary RFID applications because of security and privacy related issues. A critical threat for Mobile RFID based information systems is represented by data tampering which corresponds to the malicious alteration of data recorded in the tag memory.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    A Smarter E-currency Management System
  •    RFID-Based Clinical Decision Support System using Simulation Modeling
  •    Smart Parking System using Image Processing Techniques in Wireless Sensor Network Environment
  •    Integrated the Intelligent Agent Behavior Model and Billing Service into Communication System
  •    The Benefits and Potential of Innovative Ubiquitous Learning Environments to Enhance Higher Education Infrastructure and Student Experiences in Saudi Arabia
How to cite this article:

M. Sandhya and T.R. Rangaswamy, 2011. Prevention of Tampering Attacks in Mobile Radio Frequency Identification Environment. Information Technology Journal, 10: 1917-1925.

DOI: 10.3923/itj.2011.1917.1925

URL: https://scialert.net/abstract/?doi=itj.2011.1917.1925

COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 

Curve Bottom