File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/ICEBE.2008.92
- Scopus: eid_2-s2.0-58149102552
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Design and Analysis for RFID Authentication Protocol
Title | Design and Analysis for RFID Authentication Protocol |
---|---|
Authors | |
Keywords | Authentication Protocol BAN Logic RFID |
Issue Date | 2008 |
Publisher | IEEE. |
Citation | IEEE International Conference on e-Business Engineering, Xi'an, China, 22-24 October 2008, p. 574 - 577 How to Cite? |
Abstract | Radio frequency identification (RFID) technology has been widely used in ubiquitous infrastructures. On the other hand, the low-cost RFID system has potential risks such as privacy and security problems, which would be a big barrier for the application. First of all, we analyze the current security protocols for the RFID system. To protect user privacy and remove security vulnerabilities, we propose a robust and privacy preserving mutual authentication protocol that is suitable for the low-cost RFID environment. Finally, the correctness of the proposed authentication protocol is proved by the BAN logic. |
Persistent Identifier | http://hdl.handle.net/10722/223750 |
ISBN |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zheng, Z | - |
dc.contributor.author | Zhou, S | - |
dc.contributor.author | Luo, Z | - |
dc.date.accessioned | 2016-03-14T04:29:07Z | - |
dc.date.available | 2016-03-14T04:29:07Z | - |
dc.date.issued | 2008 | - |
dc.identifier.citation | IEEE International Conference on e-Business Engineering, Xi'an, China, 22-24 October 2008, p. 574 - 577 | - |
dc.identifier.isbn | 978-0-7695-3395-7 | - |
dc.identifier.uri | http://hdl.handle.net/10722/223750 | - |
dc.description.abstract | Radio frequency identification (RFID) technology has been widely used in ubiquitous infrastructures. On the other hand, the low-cost RFID system has potential risks such as privacy and security problems, which would be a big barrier for the application. First of all, we analyze the current security protocols for the RFID system. To protect user privacy and remove security vulnerabilities, we propose a robust and privacy preserving mutual authentication protocol that is suitable for the low-cost RFID environment. Finally, the correctness of the proposed authentication protocol is proved by the BAN logic. | - |
dc.language | eng | - |
dc.publisher | IEEE. | - |
dc.relation.ispartof | 2008 IEEE International Conference on e-Business Engineering | - |
dc.rights | ©2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. | - |
dc.subject | Authentication Protocol | - |
dc.subject | BAN Logic | - |
dc.subject | RFID | - |
dc.title | Design and Analysis for RFID Authentication Protocol | - |
dc.type | Conference_Paper | - |
dc.identifier.email | Luo, Z: zwluo@eti.hku.hk | - |
dc.description.nature | published_or_final_version | - |
dc.identifier.doi | 10.1109/ICEBE.2008.92 | - |
dc.identifier.scopus | eid_2-s2.0-58149102552 | - |
dc.identifier.hkuros | 164582 | - |
dc.identifier.spage | 574 | - |
dc.identifier.epage | 577 | - |
dc.publisher.place | Xi'an, China | - |