文章詳目資料

Journal of Computers EIMEDLINEScopus

  • 加入收藏
  • 下載文章
篇名 RFID Data Security and Privacy Based on XOR Algorism
卷期 22:3
作者 Chih-Yung Chen
頁次 055-066
關鍵字 RFIDdata securityprivacyEPCtagXOREIMEDLINEScopus
出刊日期 201110

中文摘要

英文摘要

The application of RFID after years of development, there are already many cases of the industries applied, and it is considered to be Tag as the next generation of Barcode. Therefore, if Tag use as a commodity
recognition in the future, but as consumers purchase goods in shopping malls, if suffered from hackers by the analysis frequency signal to access information, the purchase of commodities are exposed completely.
Therefore, RFID in the Data Security and Privacy is hidden in a crisis. RFID Data Security and Privacy protection using hardware ways to achieve the target is the best way; however, it is subject to the problem of Tag
costs and capacity and is currently still unresolved issues. This study focus on the Data Security and Privacy protection and put forth a EPC specifications to use the model of XOR logic operation with the method of
CRC examining the computing, and simulating the shopping mall system which provides a Data Security and Privacy protection system. We got the data after simulations to show that XOR computing to 8 bytes actual
test, the required time is 17.29 Ticks in average, the spend time is rather short. Follow-up our simulations to the test data of DES encryption methods, an average time of 8,039.41 Ticks is required, the two time required considerable differences. It was informed that this study through practical shows that we could provide a match hardware encryption methods of the specific solutions to achieve their personal privacy protection, confidentiality, confirmed, and the fulfillment of the Data Security and Privacy protection.

相關文獻