HEAL DSpace

A secure and efficient authentication protocol for passive RFID tags

Αποθετήριο DSpace/Manakin

Εμφάνιση απλής εγγραφής

dc.contributor.author Kolias, C en
dc.contributor.author Kolias, V en
dc.contributor.author Kambourakis, G en
dc.date.accessioned 2014-03-01T02:45:55Z
dc.date.available 2014-03-01T02:45:55Z
dc.date.issued 2009 en
dc.identifier.uri https://dspace.lib.ntua.gr/xmlui/handle/123456789/32461
dc.subject Authentication Protocol en
dc.subject Mutual Authentication en
dc.subject Pervasive Computing en
dc.subject Resource Utilization en
dc.subject Rfid Tag en
dc.subject Security Protocol en
dc.subject Ubiquitous Computing en
dc.subject.other Back-end servers en
dc.subject.other Computational power en
dc.subject.other Computing resource en
dc.subject.other Efficient authentication en
dc.subject.other Identical conditions en
dc.subject.other Low costs en
dc.subject.other Mutual authentication en
dc.subject.other Passive RFID en
dc.subject.other Personal data en
dc.subject.other Pervasive computing en
dc.subject.other Resource utilizations en
dc.subject.other RF-ID tags en
dc.subject.other RFID security en
dc.subject.other RFID Technology en
dc.subject.other Authentication en
dc.subject.other Cellular telephone systems en
dc.subject.other Communication systems en
dc.subject.other Global system for mobile communications en
dc.subject.other Mobile computing en
dc.subject.other Network protocols en
dc.subject.other Network security en
dc.subject.other Personal communication systems en
dc.subject.other Radio navigation en
dc.subject.other Wireless networks en
dc.subject.other Ubiquitous computing en
dc.title A secure and efficient authentication protocol for passive RFID tags en
heal.type conferenceItem en
heal.identifier.primary 10.1109/ISWCS.2009.5285367 en
heal.identifier.secondary http://dx.doi.org/10.1109/ISWCS.2009.5285367 en
heal.identifier.secondary 5285367 en
heal.publicationDate 2009 en
heal.abstract At the onset of the ubiquitous computing era, systems need to respond to a variety of challenges, in order to capitalize on the benefits of pervasiveness. One of the pivotal enablers of pervasive computing is the RFID technology which can be successfully applied in numerous applications. However, the interaction of such applications with sensitive personal data renders the need for assuring confidentiality a sine qua non. The native limitations in computing resources, i.e., computational power, memory etc, that characterize nearly all classes of RFID tags make the development of custom-tailored RFID security protocols a troublesome yet challenging task. In this paper we propose a mutual authentication protocol for low cost RFID tags and readers. We also demonstrate that our scheme is more efficient in terms of resource utilization on the backend server, and under identical conditions, more secure when compared with existing congruent protocols. © 2009 IEEE. en
heal.journalName Proceedings of the 2009 6th International Symposium on Wireless Communication Systems, ISWCS'09 en
dc.identifier.doi 10.1109/ISWCS.2009.5285367 en
dc.identifier.spage 36 en
dc.identifier.epage 40 en


Αρχεία σε αυτό το τεκμήριο

Αρχεία Μέγεθος Μορφότυπο Προβολή

Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στην ακόλουθη συλλογή(ές)

Εμφάνιση απλής εγγραφής