File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Design and Analysis for RFID Authentication Protocol

TitleDesign and Analysis for RFID Authentication Protocol
Authors
KeywordsAuthentication Protocol
BAN Logic
RFID
Issue Date2008
PublisherIEEE.
Citation
IEEE International Conference on e-Business Engineering, Xi'an, China, 22-24 October 2008, p. 574 - 577 How to Cite?
AbstractRadio frequency identification (RFID) technology has been widely used in ubiquitous infrastructures. On the other hand, the low-cost RFID system has potential risks such as privacy and security problems, which would be a big barrier for the application. First of all, we analyze the current security protocols for the RFID system. To protect user privacy and remove security vulnerabilities, we propose a robust and privacy preserving mutual authentication protocol that is suitable for the low-cost RFID environment. Finally, the correctness of the proposed authentication protocol is proved by the BAN logic.
Persistent Identifierhttp://hdl.handle.net/10722/223750
ISBN

 

DC FieldValueLanguage
dc.contributor.authorZheng, Z-
dc.contributor.authorZhou, S-
dc.contributor.authorLuo, Z-
dc.date.accessioned2016-03-14T04:29:07Z-
dc.date.available2016-03-14T04:29:07Z-
dc.date.issued2008-
dc.identifier.citationIEEE International Conference on e-Business Engineering, Xi'an, China, 22-24 October 2008, p. 574 - 577-
dc.identifier.isbn978-0-7695-3395-7-
dc.identifier.urihttp://hdl.handle.net/10722/223750-
dc.description.abstractRadio frequency identification (RFID) technology has been widely used in ubiquitous infrastructures. On the other hand, the low-cost RFID system has potential risks such as privacy and security problems, which would be a big barrier for the application. First of all, we analyze the current security protocols for the RFID system. To protect user privacy and remove security vulnerabilities, we propose a robust and privacy preserving mutual authentication protocol that is suitable for the low-cost RFID environment. Finally, the correctness of the proposed authentication protocol is proved by the BAN logic.-
dc.languageeng-
dc.publisherIEEE.-
dc.relation.ispartof2008 IEEE International Conference on e-Business Engineering-
dc.rights©2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.-
dc.subjectAuthentication Protocol-
dc.subjectBAN Logic-
dc.subjectRFID-
dc.titleDesign and Analysis for RFID Authentication Protocol-
dc.typeConference_Paper-
dc.identifier.emailLuo, Z: zwluo@eti.hku.hk-
dc.description.naturepublished_or_final_version-
dc.identifier.doi10.1109/ICEBE.2008.92-
dc.identifier.scopuseid_2-s2.0-58149102552-
dc.identifier.hkuros164582-
dc.identifier.spage574-
dc.identifier.epage577-
dc.publisher.placeXi'an, China-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats