The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Radio Frequency Identification (RFID) tags have a variety of applications in e-banking. For effective utilization of the technology, this should be reinforced toward security holes and attacks. One of the common attacks on RFID systems is RFID tags cloning. In this paper we review cloning attacks in ebanking. We propose solutions based on physical unclonable functions (PUF) and provide a suitable security protocol for tag authentication in off-line environments.

Keywords

RFID, eBanking, Physical Security, Cloning Attacks, PUF, Authentication, Network Protocols.
User
Notifications
Font Size