ABSTRACT
This study, in particular, aims to regulate the core techniques of ubiquitous computing, such as the use of an ad hoc network and the smart-tag technique, and to look more closely into RFID's smart-tag-related security service. The study aims to do so because several important technical factors and structures must be taken into account for RFID to be applied in the ubiquitous computing-related infrastructure, and the security of the tag is considered one of the core technologies. To realize secure ubiquitous computing in the case of the passive-tag-performing RF communication, a less costly security service, the technical items needed to carry this out, a security service to be applied to passive tags, and network management techniques are required. Therefore, the passive/active-tag management technique based on a secure password-based system, with the RFID tag authentication system, is proposed in this study. This system performs a secure authentication process and provides an efficient and secure management system.
- Stephen A. Weis, "Security and Privacy in Radio-Frequency Identification Devices", Masters Thesis. MIT. May, 2003Google Scholar
- Stephen A. Weis, Sanjay E.Sarma, Ronald L. Rivest and Daiel W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", First International Conference on Security in Pervasive Computing, 2003.Google Scholar
- Sanjay E.Sarma, "Towards the five-cent Tag", Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center, 2001.Google Scholar
- Sanjay E.Sarma, Stephen A. Weis and Daiel W. Engels, "Radio-Frequency Identification : Secure Risks and Challenges", RSA Laboratories Cryptobytes, vol. 6, no.1, pp.2--9. Spring 2003Google Scholar
- Sanjay E.Sarma, Stephen A. Weis and Daiel W. Engels, "Radio-frequency identification systems", In Proceeding of CHES '02, pp454--469. Springer-Verlag, 2002. LNCS no. 2523. Google ScholarDigital Library
- Miyako Ohkubo, Koutarou Suzuki and Shingo Kinoshita, "Cryptographic Approach to "Privacy-Friendly" Tag" RFID Privacy Workshop@MIT, Nov, 2003Google Scholar
Index Terms
- Secure authentication and management scheme for RFID
Recommendations
Secure remote user authentication scheme using bilinear pairings
WISTP'07: Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systemsIn 2006, Das et al. proposed a remote user authentication scheme using the properties of bilinear pairings. The current paper, however, demonstrates that Das et al.'s scheme is still vulnerable to an impersonation attack and an off-line password ...
Secure RFID authentication scheme for EPC class Gen2
ICUIMC '09: Proceedings of the 3rd International Conference on Ubiquitous Information Management and CommunicationRecently, much research has been actively conducted for a new kind of network environment ubiquitous computing. This paper will define the essential technology called "ad hoc network" and the "RFID technology" required by a ubiquitous environment. ...
Design of a secure smart card-based multi-server authentication scheme
Traditional two party client server authentication protocol may not provide a scalable solution for present network environments where personal and ubiquitous computing technologies are involved as it is now becoming multi-server based. To achieve ...
Comments