RFID (Radio Frequency IDentification) based communication solutions have been widely used nowadays for mobile environments such as access control for secure system, ticketing systems for transportation, and sport events. These systems usually depend on readers that are not continuously connected to a secure backend system. Thus, the readers should be able to perform their duties even in offline mode, which generally requires the management by the readers of the susceptible data. The use of RFID may cause several security and privacy issues such as traceability of tag owner, malicious eavesdropping and cloning of tags. Besides, when a reader is compromised by an adversary, the solution to resolve these issues getting worse. In order to handle these issues, several RFID authentication protocols have been recently proposed; but almost none of them provide strong privacy for the tag owner. On the other hand, several frameworks have been proposed to analyze the security and privacy but none of them consider offline RFID system.Motivated by this need, in this paper, we first revisit Vaudenay's model, extend it by considering offline RFID system and introduce the notion of compromise reader attacks. Then, we propose an efficient RFID mutual authentication protocol. Our protocol is based on the use of physically unclonable functions (PUFs) which provide cost-efficient means to the fingerprint chips based on their physical properties. We prove that our protocol provides destructive privacy for tag owner even against reader attacks. 相似文献
Journal of Porous Materials - Eu(NO3)3 was selected as an enhancer to improve the performance of luminescent hybrid bimodal mesoporous silica (LHMS), and a series of LHMS-EN(x)... 相似文献
Silicon - An inexpensive spray pyrolysis technique was effectively used to form a p-type SnSb2S4 thin film on n-type Si wafer for the first time to produce SnSb2S4/n-Si heterojunction. The... 相似文献
Today, the design of antenna arrays is very important in providing effective and efficient wireless communication. The purpose of antenna array synthesis is to obtain a radiation pattern with a low side lobe level (SLL) at a desired half power beam width in far-field. The amplitude and position values of the array elements can be optimized to obtain a radiation pattern with suppressed SLLs. In this paper, swarm-based metaheuristic algorithms including particle swarm optimization (PSO), artificial bee colony (ABC), mayfly algorithm (MA) and jellyfish search (JS) are compared to determine the optimal design of linear antenna arrays. Extensive experiments are conducted on designing 10-, 16-, 24- and 32-element linear arrays by determining the amplitude and positions. Experiments are repeated 30 times due to the random nature of swarm-based optimizers, and statistical results show that the performance of the novel algorithms, MA and JS, is better than that of the well-known PSO and ABC methods.