[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Volume 3, Issue 1 (9-2014) ::
منادی 2014, 3(1): 81-106 Back to browse issues page
A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems
Abstract:   (7423 Views)
A set of technologies, that use radio waves for identifying people or objects, is called radio frequency identification system or RFID. RFID performance depends on tag and reader devices which use radio waves to communicate to each other. In some applications of RFID systems, the proof of concurrent presence for a number of objects or persons together in a given time is crucial. Grouping proof protocols are designed to address these needs, in fact grouping proof shows that two or more tags are evaluated by a reader simultaneously. This proof must be verified by the corresponding verifier. In this article this type of protocols are introduced and analyzed. At the first, the idea of designing a grouping proof is presented and then related protocols and their security analysis are presented. Finally, a comparison between protocols is provided.
Keywords: Grouping Proof Protocols, Tag, Reader, RFID Systems, Verifier .
Full-Text [PDF 3142 kb]   (1258 Downloads)    
Type of Study: Review Article | Subject: Special
Received: 2015/08/18 | Accepted: 2015/08/18 | Published: 2015/08/18
Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

A Survey of Grouping Proof Protocols in Radio Frequency Identification Systems. منادی 2014; 3 (1) :81-106
URL: http://monadi.isc.org.ir/article-1-25-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 3, Issue 1 (9-2014) Back to browse issues page
دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.08 seconds with 39 queries by YEKTAWEB 4700