File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Design and Analysis for RFID Authentication Protocol

TitleDesign and Analysis for RFID Authentication Protocol
Authors
KeywordsAuthentication Protocol
BAN Logic
RFID
Issue Date2008
PublisherIEEE.
Citation
IEEE International Conference on e-Business Engineering, Xi'an, China, 22-24 October 2008, p. 574 - 577 How to Cite?
AbstractRadio frequency identification (RFID) technology has been widely used in ubiquitous infrastructures. On the other hand, the low-cost RFID system has potential risks such as privacy and security problems, which would be a big barrier for the application. First of all, we analyze the current security protocols for the RFID system. To protect user privacy and remove security vulnerabilities, we propose a robust and privacy preserving mutual authentication protocol that is suitable for the low-cost RFID environment. Finally, the correctness of the proposed authentication protocol is proved by the BAN logic.
Persistent Identifierhttp://hdl.handle.net/10722/223750
ISBN

 

DC FieldValueLanguage
dc.contributor.authorZheng, Z-
dc.contributor.authorZhou, S-
dc.contributor.authorLuo, Z-
dc.date.accessioned2016-03-14T04:29:07Z-
dc.date.available2016-03-14T04:29:07Z-
dc.date.issued2008-
dc.identifier.citationIEEE International Conference on e-Business Engineering, Xi'an, China, 22-24 October 2008, p. 574 - 577-
dc.identifier.isbn978-0-7695-3395-7-
dc.identifier.urihttp://hdl.handle.net/10722/223750-
dc.description.abstractRadio frequency identification (RFID) technology has been widely used in ubiquitous infrastructures. On the other hand, the low-cost RFID system has potential risks such as privacy and security problems, which would be a big barrier for the application. First of all, we analyze the current security protocols for the RFID system. To protect user privacy and remove security vulnerabilities, we propose a robust and privacy preserving mutual authentication protocol that is suitable for the low-cost RFID environment. Finally, the correctness of the proposed authentication protocol is proved by the BAN logic.-
dc.languageeng-
dc.publisherIEEE.-
dc.relation.ispartof2008 IEEE International Conference on e-Business Engineering-
dc.rights2008 IEEE International Conference on e-Business Engineering. Copyright © IEEE.-
dc.rights©20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.-
dc.rightsCreative Commons: Attribution 3.0 Hong Kong License-
dc.subjectAuthentication Protocol-
dc.subjectBAN Logic-
dc.subjectRFID-
dc.titleDesign and Analysis for RFID Authentication Protocol-
dc.typeConference_Paper-
dc.identifier.emailLuo, Z: zwluo@eti.hku.hk-
dc.description.naturepublished_or_final_version-
dc.identifier.doi10.1109/ICEBE.2008.92-
dc.identifier.hkuros164582-
dc.identifier.spage574-
dc.identifier.epage577-
dc.publisher.placeXi'an, China-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats