期刊文献+

Mutual Authentication Protocols for RFID Systems 被引量:3

Mutual Authentication Protocols for RFID Systems
下载PDF
导出
摘要 With the availability of low-cost radio frequency identification (RFID) tags,security becomes an increasing concern. However,such tags do not permit complex cryptographic functions due to their computational,communications,and storage limitations. In this paper,we investigate the security issues and requirements of RFID systems,and propose ultra-light weight and light weight protocols for low-cost RFID tags.The proposed protocols has been applied to a supply chain management system. With the availability of low-cost radio frequency identification (RFID) tags,security becomes an increasing concern. However,such tags do not permit complex cryptographic functions due to their computational,communications,and storage limitations. In this paper,we investigate the security issues and requirements of RFID systems,and propose ultra-light weight and light weight protocols for low-cost RFID tags.The proposed protocols has been applied to a supply chain management system.
出处 《International Journal of Automation and computing》 EI 2008年第4期348-365,共18页 国际自动化与计算杂志(英文版)
关键词 SECURITY mutual authentication supply chain management RFID Systems. Security mutual authentication supply chain management RFID Systems.
  • 相关文献

参考文献13

  • 1[1]I.Vajda,L.Buttyan.Lightweight Authentication Pro-tocols for Low-cost RFID Tags.In Proceedings of the 2rid Workshop on Security in Uniquitous Com-puting-Ubicomp,[Online],Available:http://www.hit.bme.hu/-buttyan/publications/VajdaB03suc.pdf,2003.
  • 2[2]S.A.Weis,S.E.Sarma,R.L.Rivest,D.W.Eengels.Se-curity and Privacy Aspects of Low-cost Radio Frequency Identification Systems.In Proceedings of Internationl Con-ference on Security in Pervasive Computin,Lecture Notes in Computer Seince,Springer-Verlag,vol.2802,pp.202-212,2004.
  • 3[3]M.Ohkubo,K.Suzuki,S.Kinoshita.Cryptographic Approach to "privacy-friendly" Tags.In Proceedings of RFID Privacy Workshop,MIT,Massachusetts,USA,[Online],Available:http://lasecwww.epfl.ch/-gavoine/download/papers/OhkuboSK-2003-mit-paper.pdf 2003.
  • 4[4]AID Center.900 MHs Class O Radio Frequency (RF) Identification Tag Specification,Auto-ID Cen-ter,Cambridge,MA,USA,[Online],Available:http://www.epcglobalinc.org/standards/specs/900_MHz_Class_O_RFIDTag_Specification.pdf,2003.
  • 5[5]D.Henrici,P.Muller.Hash-based Enhancement of Loca-tion Privacy for Radio-frequency Identification Devices Us-ing Varying Identifiers.In Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Commu-nications Workshops,IEEE Press,pp.149-153,2004.
  • 6[6]S.Lee,T.Asano,K.Kim.RFID Mutual Authentication Scheme Based on Synchronized Secret Information.In Proceedngs of Symposium on Cryptography and Infor-mation Security,Hiroshima,Japan,[Online],Available:http:/ /caislab.ieu.ac.kr /Paper /paper_files/2006/SCIS_Lee.pdf,2006.
  • 7[7]J.Yang,J.Park,H.Lee,K.Ren,K.Kim.Mutual Au-thentication Protocol for Low-cost RFID.In Proceedings of Workshop on RFID and Lightweight Crypto,pp.17-24,2005.
  • 8[8]B.Calmels,S.Canard,M.Girault,H.Sibert.Low-cost Cryptography for Privacy in RFID Systems.In Proceed-ings of International Conference on Smart Card Research and Advanced Applications,Lecture Notes in Computer Science,Springer-Verlag,voL 3928,pp.273-251,2006.
  • 9[9]A.Juels.Minimalist Cryptography for Low-cost RFID Tags.In Proceedings of the 4th International Conference on Security in Communication Networks,Lecture Notes in Computer Science,Springer-Verlag,vol.3352,pp.149-164,2004.
  • 10[10]L.Batina,J.Guajardo,T.Kerins,N.Mentens,P.Tuyls,I.Verbauwhede.Public Key Cryptography for RFID-tags.In Proceedings of the 5th IEEE International Conference on Pervasive Computing and Communications Workshops,IEEE Press,pp.217-222,2006.

同被引文献31

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部