File Download
 
Links for fulltext
(May Require Subscription)
 
Supplementary

Conference Paper: Experimental analysis of an RFID security protocol
  • Basic View
  • Metadata View
  • XML View
TitleExperimental analysis of an RFID security protocol
 
AuthorsLuo, Z2
Chan, T2
Li, JS1
Wong, E2
Cheung, W3
Ng, V2
Fok, W2
 
KeywordsRFID applications
Sensor systems
System security
 
Issue Date2006
 
PublisherIEEE.
 
CitationProceedings - Ieee International Conference On E-Business Engineering, Icebe 2006, 2006, p. 62-69 [How to Cite?]
DOI: http://dx.doi.org/10.1109/ICEBE.2006.49
 
AbstractRadio frequency identification (RFID) technology is expected to become a critical and ubiquitous infrastructure technology of logistics and supply chain management (SCM) related processes and services. Low-cost has been the key to RFID adoption in many logistics/SCM applications. However, the deployment of such tags may create new threats to user privacy due to the powerful track and trace capabilities of the tags, in addition to tag/reader manufacturing challenges. As a result, some security mechanisms must be imposed on the RFID tags for addressing the privacy problems. This paper provides detailed discussion on our proposal of a lightweight RFID security protocol. It examines the features and issues through experimental analysis pertinent to efficiency and scalability to meet the requirements of the proposed security protocol in metering and payment e-commerce applications. © 2006 IEEE.
 
DOIhttp://dx.doi.org/10.1109/ICEBE.2006.49
 
ReferencesReferences in Scopus
 
DC FieldValue
dc.contributor.authorLuo, Z
 
dc.contributor.authorChan, T
 
dc.contributor.authorLi, JS
 
dc.contributor.authorWong, E
 
dc.contributor.authorCheung, W
 
dc.contributor.authorNg, V
 
dc.contributor.authorFok, W
 
dc.date.accessioned2010-09-26T01:08:37Z
 
dc.date.available2010-09-26T01:08:37Z
 
dc.date.issued2006
 
dc.description.abstractRadio frequency identification (RFID) technology is expected to become a critical and ubiquitous infrastructure technology of logistics and supply chain management (SCM) related processes and services. Low-cost has been the key to RFID adoption in many logistics/SCM applications. However, the deployment of such tags may create new threats to user privacy due to the powerful track and trace capabilities of the tags, in addition to tag/reader manufacturing challenges. As a result, some security mechanisms must be imposed on the RFID tags for addressing the privacy problems. This paper provides detailed discussion on our proposal of a lightweight RFID security protocol. It examines the features and issues through experimental analysis pertinent to efficiency and scalability to meet the requirements of the proposed security protocol in metering and payment e-commerce applications. © 2006 IEEE.
 
dc.description.natureLink_to_subscribed_fulltext
 
dc.identifier.citationProceedings - Ieee International Conference On E-Business Engineering, Icebe 2006, 2006, p. 62-69 [How to Cite?]
DOI: http://dx.doi.org/10.1109/ICEBE.2006.49
 
dc.identifier.doihttp://dx.doi.org/10.1109/ICEBE.2006.49
 
dc.identifier.epage69
 
dc.identifier.hkuros144378
 
dc.identifier.scopuseid_2-s2.0-38649093940
 
dc.identifier.spage62
 
dc.identifier.urihttp://hdl.handle.net/10722/109114
 
dc.languageeng
 
dc.publisherIEEE.
 
dc.relation.ispartofProceedings - IEEE International Conference on e-Business Engineering, ICEBE 2006
 
dc.relation.referencesReferences in Scopus
 
dc.rights©2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
 
dc.subjectRFID applications
 
dc.subjectSensor systems
 
dc.subjectSystem security
 
dc.titleExperimental analysis of an RFID security protocol
 
dc.typeConference_Paper
 
<?xml encoding="utf-8" version="1.0"?>
<item><contributor.author>Luo, Z</contributor.author>
<contributor.author>Chan, T</contributor.author>
<contributor.author>Li, JS</contributor.author>
<contributor.author>Wong, E</contributor.author>
<contributor.author>Cheung, W</contributor.author>
<contributor.author>Ng, V</contributor.author>
<contributor.author>Fok, W</contributor.author>
<date.accessioned>2010-09-26T01:08:37Z</date.accessioned>
<date.available>2010-09-26T01:08:37Z</date.available>
<date.issued>2006</date.issued>
<identifier.citation>Proceedings - Ieee International Conference On E-Business Engineering, Icebe 2006, 2006, p. 62-69</identifier.citation>
<identifier.uri>http://hdl.handle.net/10722/109114</identifier.uri>
<description.abstract>Radio frequency identification (RFID) technology is expected to become a critical and ubiquitous infrastructure technology of logistics and supply chain management (SCM) related processes and services. Low-cost has been the key to RFID adoption in many logistics/SCM applications. However, the deployment of such tags may create new threats to user privacy due to the powerful track and trace capabilities of the tags, in addition to tag/reader manufacturing challenges. As a result, some security mechanisms must be imposed on the RFID tags for addressing the privacy problems. This paper provides detailed discussion on our proposal of a lightweight RFID security protocol. It examines the features and issues through experimental analysis pertinent to efficiency and scalability to meet the requirements of the proposed security protocol in metering and payment e-commerce applications. &#169; 2006 IEEE.</description.abstract>
<language>eng</language>
<publisher>IEEE.</publisher>
<relation.ispartof>Proceedings - IEEE International Conference on e-Business Engineering, ICEBE 2006</relation.ispartof>
<rights>&#169;2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.</rights>
<subject>RFID applications</subject>
<subject>Sensor systems</subject>
<subject>System security</subject>
<title>Experimental analysis of an RFID security protocol</title>
<type>Conference_Paper</type>
<description.nature>Link_to_subscribed_fulltext</description.nature>
<identifier.doi>10.1109/ICEBE.2006.49</identifier.doi>
<identifier.scopus>eid_2-s2.0-38649093940</identifier.scopus>
<identifier.hkuros>144378</identifier.hkuros>
<relation.references>http://www.scopus.com/mlt/select.url?eid=2-s2.0-38649093940&amp;selection=ref&amp;src=s&amp;origin=recordpage</relation.references>
<identifier.spage>62</identifier.spage>
<identifier.epage>69</identifier.epage>
</item>
Author Affiliations
  1. International Business Machines
  2. The University of Hong Kong
  3. Hong Kong Baptist University