Experimental Analysis of an RFID Security Protocol
Radio frequency identification (RFID) technology is expected to become a critical and ubiquitous infrastructure technology of logistics and supply chain management (SCM) related processes and services. Low-cost has been the key to RFID adoption in many logistics/SCM applications. However, the deploy...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 70 |
---|---|
container_issue | |
container_start_page | 62 |
container_title | |
container_volume | |
creator | Zongwei Luo Chan, T. Li, J.S. Wong, E. Cheung, W. Ng, V. Wilton Fok |
description | Radio frequency identification (RFID) technology is expected to become a critical and ubiquitous infrastructure technology of logistics and supply chain management (SCM) related processes and services. Low-cost has been the key to RFID adoption in many logistics/SCM applications. However, the deployment of such tags may create new threats to user privacy due to the powerful track and trace capabilities of the tags, in addition to tag/reader manufacturing challenges. As a result, some security mechanisms must be imposed on the RFID tags for addressing the privacy problems. This paper provides detailed discussion on our proposal of a lightweight RFID security protocol. It examines the features and issues through experimental analysis pertinent to efficiency and scalability to meet the requirements of the proposed security protocol in metering and payment e-commerce applications |
doi_str_mv | 10.1109/ICEBE.2006.49 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4031634</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4031634</ieee_id><sourcerecordid>4031634</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-fdd7829e6e41e569596497d13f83be6cc784dfb2b679a7d234c74bf2d98b0803</originalsourceid><addsrcrecordid>eNotjstKxDAUQAMiqOMsXbnJD7TmcZM0y7F2tDCg6OyHPG6gUtuhqWD_3oKezdkdDiF3nJWcM_vQ1s1jUwrGdAn2gtwwo60SGhRckW3On2xFWtBcXRPR_Jxx6r5wmF1Pd4Prl9xlOibqBvq-b5_oB4bvqZsX-jaN8xjG_pZcJtdn3P57Q4775li_FIfX57beHYqOGzUXKUZTCYsagaNaD6wGayKXqZIedQimgpi88NpYZ6KQEAz4JKKtPKuY3JD7v2yHiKfz-uim5QRMci1B_gISPkDV</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Experimental Analysis of an RFID Security Protocol</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Zongwei Luo ; Chan, T. ; Li, J.S. ; Wong, E. ; Cheung, W. ; Ng, V. ; Wilton Fok</creator><creatorcontrib>Zongwei Luo ; Chan, T. ; Li, J.S. ; Wong, E. ; Cheung, W. ; Ng, V. ; Wilton Fok</creatorcontrib><description>Radio frequency identification (RFID) technology is expected to become a critical and ubiquitous infrastructure technology of logistics and supply chain management (SCM) related processes and services. Low-cost has been the key to RFID adoption in many logistics/SCM applications. However, the deployment of such tags may create new threats to user privacy due to the powerful track and trace capabilities of the tags, in addition to tag/reader manufacturing challenges. As a result, some security mechanisms must be imposed on the RFID tags for addressing the privacy problems. This paper provides detailed discussion on our proposal of a lightweight RFID security protocol. It examines the features and issues through experimental analysis pertinent to efficiency and scalability to meet the requirements of the proposed security protocol in metering and payment e-commerce applications</description><identifier>ISBN: 0769526454</identifier><identifier>ISBN: 9780769526454</identifier><identifier>DOI: 10.1109/ICEBE.2006.49</identifier><language>eng</language><publisher>IEEE</publisher><subject>Logistics ; Manufacturing ; Privacy ; Proposals ; Protocols ; Radiofrequency identification ; RFID tags ; Scalability ; Security ; Supply chain management</subject><ispartof>2006 IEEE International Conference on e-Business Engineering (ICEBE'06), 2006, p.62-70</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4031634$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27904,54898</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4031634$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Zongwei Luo</creatorcontrib><creatorcontrib>Chan, T.</creatorcontrib><creatorcontrib>Li, J.S.</creatorcontrib><creatorcontrib>Wong, E.</creatorcontrib><creatorcontrib>Cheung, W.</creatorcontrib><creatorcontrib>Ng, V.</creatorcontrib><creatorcontrib>Wilton Fok</creatorcontrib><title>Experimental Analysis of an RFID Security Protocol</title><title>2006 IEEE International Conference on e-Business Engineering (ICEBE'06)</title><addtitle>ICEBE</addtitle><description>Radio frequency identification (RFID) technology is expected to become a critical and ubiquitous infrastructure technology of logistics and supply chain management (SCM) related processes and services. Low-cost has been the key to RFID adoption in many logistics/SCM applications. However, the deployment of such tags may create new threats to user privacy due to the powerful track and trace capabilities of the tags, in addition to tag/reader manufacturing challenges. As a result, some security mechanisms must be imposed on the RFID tags for addressing the privacy problems. This paper provides detailed discussion on our proposal of a lightweight RFID security protocol. It examines the features and issues through experimental analysis pertinent to efficiency and scalability to meet the requirements of the proposed security protocol in metering and payment e-commerce applications</description><subject>Logistics</subject><subject>Manufacturing</subject><subject>Privacy</subject><subject>Proposals</subject><subject>Protocols</subject><subject>Radiofrequency identification</subject><subject>RFID tags</subject><subject>Scalability</subject><subject>Security</subject><subject>Supply chain management</subject><isbn>0769526454</isbn><isbn>9780769526454</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjstKxDAUQAMiqOMsXbnJD7TmcZM0y7F2tDCg6OyHPG6gUtuhqWD_3oKezdkdDiF3nJWcM_vQ1s1jUwrGdAn2gtwwo60SGhRckW3On2xFWtBcXRPR_Jxx6r5wmF1Pd4Prl9xlOibqBvq-b5_oB4bvqZsX-jaN8xjG_pZcJtdn3P57Q4775li_FIfX57beHYqOGzUXKUZTCYsagaNaD6wGayKXqZIedQimgpi88NpYZ6KQEAz4JKKtPKuY3JD7v2yHiKfz-uim5QRMci1B_gISPkDV</recordid><startdate>200610</startdate><enddate>200610</enddate><creator>Zongwei Luo</creator><creator>Chan, T.</creator><creator>Li, J.S.</creator><creator>Wong, E.</creator><creator>Cheung, W.</creator><creator>Ng, V.</creator><creator>Wilton Fok</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200610</creationdate><title>Experimental Analysis of an RFID Security Protocol</title><author>Zongwei Luo ; Chan, T. ; Li, J.S. ; Wong, E. ; Cheung, W. ; Ng, V. ; Wilton Fok</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-fdd7829e6e41e569596497d13f83be6cc784dfb2b679a7d234c74bf2d98b0803</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Logistics</topic><topic>Manufacturing</topic><topic>Privacy</topic><topic>Proposals</topic><topic>Protocols</topic><topic>Radiofrequency identification</topic><topic>RFID tags</topic><topic>Scalability</topic><topic>Security</topic><topic>Supply chain management</topic><toplevel>online_resources</toplevel><creatorcontrib>Zongwei Luo</creatorcontrib><creatorcontrib>Chan, T.</creatorcontrib><creatorcontrib>Li, J.S.</creatorcontrib><creatorcontrib>Wong, E.</creatorcontrib><creatorcontrib>Cheung, W.</creatorcontrib><creatorcontrib>Ng, V.</creatorcontrib><creatorcontrib>Wilton Fok</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zongwei Luo</au><au>Chan, T.</au><au>Li, J.S.</au><au>Wong, E.</au><au>Cheung, W.</au><au>Ng, V.</au><au>Wilton Fok</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Experimental Analysis of an RFID Security Protocol</atitle><btitle>2006 IEEE International Conference on e-Business Engineering (ICEBE'06)</btitle><stitle>ICEBE</stitle><date>2006-10</date><risdate>2006</risdate><spage>62</spage><epage>70</epage><pages>62-70</pages><isbn>0769526454</isbn><isbn>9780769526454</isbn><abstract>Radio frequency identification (RFID) technology is expected to become a critical and ubiquitous infrastructure technology of logistics and supply chain management (SCM) related processes and services. Low-cost has been the key to RFID adoption in many logistics/SCM applications. However, the deployment of such tags may create new threats to user privacy due to the powerful track and trace capabilities of the tags, in addition to tag/reader manufacturing challenges. As a result, some security mechanisms must be imposed on the RFID tags for addressing the privacy problems. This paper provides detailed discussion on our proposal of a lightweight RFID security protocol. It examines the features and issues through experimental analysis pertinent to efficiency and scalability to meet the requirements of the proposed security protocol in metering and payment e-commerce applications</abstract><pub>IEEE</pub><doi>10.1109/ICEBE.2006.49</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 0769526454 |
ispartof | 2006 IEEE International Conference on e-Business Engineering (ICEBE'06), 2006, p.62-70 |
issn | |
language | eng |
recordid | cdi_ieee_primary_4031634 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Logistics Manufacturing Privacy Proposals Protocols Radiofrequency identification RFID tags Scalability Security Supply chain management |
title | Experimental Analysis of an RFID Security Protocol |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T23%3A56%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Experimental%20Analysis%20of%20an%20RFID%20Security%20Protocol&rft.btitle=2006%20IEEE%20International%20Conference%20on%20e-Business%20Engineering%20(ICEBE'06)&rft.au=Zongwei%20Luo&rft.date=2006-10&rft.spage=62&rft.epage=70&rft.pages=62-70&rft.isbn=0769526454&rft.isbn_list=9780769526454&rft_id=info:doi/10.1109/ICEBE.2006.49&rft_dat=%3Cieee_6IE%3E4031634%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4031634&rfr_iscdi=true |