dc.contributor.author |
Kolias, C |
en |
dc.contributor.author |
Kolias, V |
en |
dc.contributor.author |
Kambourakis, G |
en |
dc.date.accessioned |
2014-03-01T02:45:55Z |
|
dc.date.available |
2014-03-01T02:45:55Z |
|
dc.date.issued |
2009 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/32461 |
|
dc.subject |
Authentication Protocol |
en |
dc.subject |
Mutual Authentication |
en |
dc.subject |
Pervasive Computing |
en |
dc.subject |
Resource Utilization |
en |
dc.subject |
Rfid Tag |
en |
dc.subject |
Security Protocol |
en |
dc.subject |
Ubiquitous Computing |
en |
dc.subject.other |
Back-end servers |
en |
dc.subject.other |
Computational power |
en |
dc.subject.other |
Computing resource |
en |
dc.subject.other |
Efficient authentication |
en |
dc.subject.other |
Identical conditions |
en |
dc.subject.other |
Low costs |
en |
dc.subject.other |
Mutual authentication |
en |
dc.subject.other |
Passive RFID |
en |
dc.subject.other |
Personal data |
en |
dc.subject.other |
Pervasive computing |
en |
dc.subject.other |
Resource utilizations |
en |
dc.subject.other |
RF-ID tags |
en |
dc.subject.other |
RFID security |
en |
dc.subject.other |
RFID Technology |
en |
dc.subject.other |
Authentication |
en |
dc.subject.other |
Cellular telephone systems |
en |
dc.subject.other |
Communication systems |
en |
dc.subject.other |
Global system for mobile communications |
en |
dc.subject.other |
Mobile computing |
en |
dc.subject.other |
Network protocols |
en |
dc.subject.other |
Network security |
en |
dc.subject.other |
Personal communication systems |
en |
dc.subject.other |
Radio navigation |
en |
dc.subject.other |
Wireless networks |
en |
dc.subject.other |
Ubiquitous computing |
en |
dc.title |
A secure and efficient authentication protocol for passive RFID tags |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1109/ISWCS.2009.5285367 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1109/ISWCS.2009.5285367 |
en |
heal.identifier.secondary |
5285367 |
en |
heal.publicationDate |
2009 |
en |
heal.abstract |
At the onset of the ubiquitous computing era, systems need to respond to a variety of challenges, in order to capitalize on the benefits of pervasiveness. One of the pivotal enablers of pervasive computing is the RFID technology which can be successfully applied in numerous applications. However, the interaction of such applications with sensitive personal data renders the need for assuring confidentiality a sine qua non. The native limitations in computing resources, i.e., computational power, memory etc, that characterize nearly all classes of RFID tags make the development of custom-tailored RFID security protocols a troublesome yet challenging task. In this paper we propose a mutual authentication protocol for low cost RFID tags and readers. We also demonstrate that our scheme is more efficient in terms of resource utilization on the backend server, and under identical conditions, more secure when compared with existing congruent protocols. © 2009 IEEE. |
en |
heal.journalName |
Proceedings of the 2009 6th International Symposium on Wireless Communication Systems, ISWCS'09 |
en |
dc.identifier.doi |
10.1109/ISWCS.2009.5285367 |
en |
dc.identifier.spage |
36 |
en |
dc.identifier.epage |
40 |
en |