题名

Reliable Delegation Scheme for RFID Systems

作者

Narn-Yih Lee;Zong-Jhih Lin

关键词

Cryptography ; Delegation ; RFID ; Timestamp ; Security

期刊名称

International Journal of Electronic Commerce Studies

卷期/出版年月

1卷1期(2010 / 06 / 01)

页次

51 - 59

内容语文

英文

英文摘要

Radio Frequency Identification (RFID) systems are an automatic and contactless technology. However, RFID systems also introduce new privacy and security risks. Many papers have tried to propose various RFID authentication mechanisms to solve the RFID privacy issues. In 2005, Molnar et al. first presented the property of delegation. In 2007, Fouladgar and Afifi proposed a simple delegation scheme for RFID systems. The scheme utilizes a counter to control delegation time, but it cannot do so accurately. In this paper, we aim to use the timestamp to control delegation time and enhance the security of RFID systems.

主题分类 基礎與應用科學 > 資訊科學
社會科學 > 經濟學
社會科學 > 財金及會計學
社會科學 > 管理學
参考文献
  1. Choi, D. H.,Kim, T. S.,Kim, H. W.(2006).Privacy protection for secure mobile RFID service.International Symposium on Wireless Pervasive Computing
  2. Conti, M.,Pietro, R. D.,Mancini, L. V.,Spognardi, A.(2006).RIPP-FS: An RFID Identification. Privacy Preserving Protocol with Forward Secrecy.International Conference on Pervasive Computing and Communications workshops, PerComW
  3. Finkenzeller, K..RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification.
  4. Fouladgar, S.,Afifi, H.(2007).A Simple Delegation Scheme for RFID Systems (SiDeS).IEEE International Conference on RFID
  5. Gao, X.,Xiang, Z.,Wang, H.,Shen, J.,Huang, J.,Song, S.(2004).An approach to security and privacy of RFID system for supply chain.IEEE International Conferenceon E-Commerce Technology for Dynamic E-Business
  6. Garfinkel, S. L.,Juels, A.,Pappu, R.(2005).RFID privacy: an overview of problems and proposed solutions.Security & Privacy Magazine, IEEE,34-43.
  7. Haller, N. M.(1994).The S/KEY one-time password system.Proceedings of the Symposium on Network and Distributed System Security
  8. Juels(2006).RFID Security and Privacy: A Research Survey.IEEE Journal on Selected Areas in Communications,24(1),381-394.
  9. Juels, A.,Pappu, R.(2003).Squealing Euros: Privacy Protection in RFID-Enabled Banknotes.Lecture Note in Computer Science Financial Cryptography 2003
  10. Knospe, H.,Pohl, H.(2004).RFID Security.Information Security Technical Report,9(4),39-50.
  11. Liao, P. C.,Liu, L.,Kuo, F.,Jin, M. H.(2006).Developing a Patient Safety Based RFID Information System-An Empirical Study in Taiwan.IEEE International Conferenceon Management of Innovation and Technology
  12. Molnar, D.,Soppera, A.,Wagner, D.(2005).A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags.Selected Areas in Cryptography, SAC2005
  13. Molnar, D.,Wagner, D.(2004).Privacy and security in library RFID: issues, practices, and architectures.ACM conference on Computer and communications security