A scalable and untraceable authentication protocol for RFID

Cited 7 time in webofscience Cited 0 time in scopus
  • Hit : 353
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorSeo, Young-Joonko
dc.contributor.authorLee, Hyun-Rokko
dc.contributor.authorKim, Kwang-Joko
dc.date.accessioned2013-03-08T08:27:33Z-
dc.date.available2013-03-08T08:27:33Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2006-08-
dc.identifier.citationEMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.4097, pp.252 - 261-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10203/92602-
dc.description.abstractRFID (Radio Frequency Identification) is recently becoming popular, promising and widespread. In contrast, RFID tags can bring about traceability that causes user privacy and reduces scalability of RFID. Guaranteeing untraceability and scalability at the same time is so critical in order to deploy RFID widely since user privacy should be guaranteed. A large number of RFID protocols were designed in the open literature, but any known protocols do not satisfy untraceability and scalability at the same time to the best of our knowledge. In this paper, we suggest a RFID authentication protocol that guarantees untraceability and scalability together; needless to say preventing several known attacks: replay, spoofing, desyncronization, and cloning by eavesdropping. Our protocol supports ownership transfer and considers multitag-reader environment; a reader receives messages from the tags what a reader wants in our protocol. In addition, we address the reason why the item privacy is important, and a way to keep it securely.-
dc.languageEnglish-
dc.publisherSPRINGER-VERLAG BERLIN-
dc.titleA scalable and untraceable authentication protocol for RFID-
dc.typeArticle-
dc.identifier.wosid000240081000026-
dc.identifier.scopusid2-s2.0-33749406338-
dc.type.rimsART-
dc.citation.volume4097-
dc.citation.beginningpage252-
dc.citation.endingpage261-
dc.citation.publicationnameEMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE-
dc.contributor.localauthorKim, Kwang-Jo-
dc.contributor.nonIdAuthorSeo, Young-Joon-
dc.contributor.nonIdAuthorLee, Hyun-Rok-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle; Proceedings Paper-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 7 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0