skip to main content
10.1145/1454586.1454605acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Secure authentication and management scheme for RFID

Published:27 October 2008Publication History

ABSTRACT

This study, in particular, aims to regulate the core techniques of ubiquitous computing, such as the use of an ad hoc network and the smart-tag technique, and to look more closely into RFID's smart-tag-related security service. The study aims to do so because several important technical factors and structures must be taken into account for RFID to be applied in the ubiquitous computing-related infrastructure, and the security of the tag is considered one of the core technologies. To realize secure ubiquitous computing in the case of the passive-tag-performing RF communication, a less costly security service, the technical items needed to carry this out, a security service to be applied to passive tags, and network management techniques are required. Therefore, the passive/active-tag management technique based on a secure password-based system, with the RFID tag authentication system, is proposed in this study. This system performs a secure authentication process and provides an efficient and secure management system.

References

  1. Stephen A. Weis, "Security and Privacy in Radio-Frequency Identification Devices", Masters Thesis. MIT. May, 2003Google ScholarGoogle Scholar
  2. Stephen A. Weis, Sanjay E.Sarma, Ronald L. Rivest and Daiel W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", First International Conference on Security in Pervasive Computing, 2003.Google ScholarGoogle Scholar
  3. Sanjay E.Sarma, "Towards the five-cent Tag", Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center, 2001.Google ScholarGoogle Scholar
  4. Sanjay E.Sarma, Stephen A. Weis and Daiel W. Engels, "Radio-Frequency Identification : Secure Risks and Challenges", RSA Laboratories Cryptobytes, vol. 6, no.1, pp.2--9. Spring 2003Google ScholarGoogle Scholar
  5. Sanjay E.Sarma, Stephen A. Weis and Daiel W. Engels, "Radio-frequency identification systems", In Proceeding of CHES '02, pp454--469. Springer-Verlag, 2002. LNCS no. 2523. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Miyako Ohkubo, Koutarou Suzuki and Shingo Kinoshita, "Cryptographic Approach to "Privacy-Friendly" Tag" RFID Privacy Workshop@MIT, Nov, 2003Google ScholarGoogle Scholar

Index Terms

  1. Secure authentication and management scheme for RFID

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      Q2SWinet '08: Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
      October 2008
      124 pages
      ISBN:9781605582375
      DOI:10.1145/1454586

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 27 October 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate46of131submissions,35%
    • Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader