A Framework for the RFID Information Security and Privacy Protection
RFID in the Information Security and Privacy is hidden in a crisis. RFID Information Security and Privacy Protection using hardware ways to achieve the target is the best way, however, it is subject to the problem of Tag costs and capacity and is currently still unresolved issues. This study focus o...
Saved in:
Published in | 2011 Fifth International Conference on Genetic and Evolutionary Computing pp. 243 - 246 |
---|---|
Main Author | |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.08.2011
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | RFID in the Information Security and Privacy is hidden in a crisis. RFID Information Security and Privacy Protection using hardware ways to achieve the target is the best way, however, it is subject to the problem of Tag costs and capacity and is currently still unresolved issues. This study focus on the Information Security and Privacy Protection and put forth a EPC specifications to use the model of XOR logic operation with the method of CRC examining the computing, and simulating the shopping mall system which provides a Information Security and Privacy Protection system. We got the data after simulations to show that XOR computing to actual test of 8 bytes, the required time is 17.29 Ticks in average, the spend time is rather short. Follow-up our simulations to the test data of DES encryption methods, an average time of 8,039.41 Ticks is required, the two time required considerable differences. It was informed that this study through practical shows that we could provide a match hardware encryption methods of the specific solutions to achieve their personal privacy protection, confidentiality, confirmed, and the fulfillment of the Information Security and Privacy Protection. |
---|---|
ISBN: | 9781457708176 1457708175 |
DOI: | 10.1109/ICGEC.2011.64 |