Experimental Analysis of an RFID Security Protocol

Radio frequency identification (RFID) technology is expected to become a critical and ubiquitous infrastructure technology of logistics and supply chain management (SCM) related processes and services. Low-cost has been the key to RFID adoption in many logistics/SCM applications. However, the deploy...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Zongwei Luo, Chan, T., Li, J.S., Wong, E., Cheung, W., Ng, V., Wilton Fok
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 70
container_issue
container_start_page 62
container_title
container_volume
creator Zongwei Luo
Chan, T.
Li, J.S.
Wong, E.
Cheung, W.
Ng, V.
Wilton Fok
description Radio frequency identification (RFID) technology is expected to become a critical and ubiquitous infrastructure technology of logistics and supply chain management (SCM) related processes and services. Low-cost has been the key to RFID adoption in many logistics/SCM applications. However, the deployment of such tags may create new threats to user privacy due to the powerful track and trace capabilities of the tags, in addition to tag/reader manufacturing challenges. As a result, some security mechanisms must be imposed on the RFID tags for addressing the privacy problems. This paper provides detailed discussion on our proposal of a lightweight RFID security protocol. It examines the features and issues through experimental analysis pertinent to efficiency and scalability to meet the requirements of the proposed security protocol in metering and payment e-commerce applications
doi_str_mv 10.1109/ICEBE.2006.49
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4031634</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4031634</ieee_id><sourcerecordid>4031634</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-fdd7829e6e41e569596497d13f83be6cc784dfb2b679a7d234c74bf2d98b0803</originalsourceid><addsrcrecordid>eNotjstKxDAUQAMiqOMsXbnJD7TmcZM0y7F2tDCg6OyHPG6gUtuhqWD_3oKezdkdDiF3nJWcM_vQ1s1jUwrGdAn2gtwwo60SGhRckW3On2xFWtBcXRPR_Jxx6r5wmF1Pd4Prl9xlOibqBvq-b5_oB4bvqZsX-jaN8xjG_pZcJtdn3P57Q4775li_FIfX57beHYqOGzUXKUZTCYsagaNaD6wGayKXqZIedQimgpi88NpYZ6KQEAz4JKKtPKuY3JD7v2yHiKfz-uim5QRMci1B_gISPkDV</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Experimental Analysis of an RFID Security Protocol</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Zongwei Luo ; Chan, T. ; Li, J.S. ; Wong, E. ; Cheung, W. ; Ng, V. ; Wilton Fok</creator><creatorcontrib>Zongwei Luo ; Chan, T. ; Li, J.S. ; Wong, E. ; Cheung, W. ; Ng, V. ; Wilton Fok</creatorcontrib><description>Radio frequency identification (RFID) technology is expected to become a critical and ubiquitous infrastructure technology of logistics and supply chain management (SCM) related processes and services. Low-cost has been the key to RFID adoption in many logistics/SCM applications. However, the deployment of such tags may create new threats to user privacy due to the powerful track and trace capabilities of the tags, in addition to tag/reader manufacturing challenges. As a result, some security mechanisms must be imposed on the RFID tags for addressing the privacy problems. This paper provides detailed discussion on our proposal of a lightweight RFID security protocol. It examines the features and issues through experimental analysis pertinent to efficiency and scalability to meet the requirements of the proposed security protocol in metering and payment e-commerce applications</description><identifier>ISBN: 0769526454</identifier><identifier>ISBN: 9780769526454</identifier><identifier>DOI: 10.1109/ICEBE.2006.49</identifier><language>eng</language><publisher>IEEE</publisher><subject>Logistics ; Manufacturing ; Privacy ; Proposals ; Protocols ; Radiofrequency identification ; RFID tags ; Scalability ; Security ; Supply chain management</subject><ispartof>2006 IEEE International Conference on e-Business Engineering (ICEBE'06), 2006, p.62-70</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4031634$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27904,54898</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4031634$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Zongwei Luo</creatorcontrib><creatorcontrib>Chan, T.</creatorcontrib><creatorcontrib>Li, J.S.</creatorcontrib><creatorcontrib>Wong, E.</creatorcontrib><creatorcontrib>Cheung, W.</creatorcontrib><creatorcontrib>Ng, V.</creatorcontrib><creatorcontrib>Wilton Fok</creatorcontrib><title>Experimental Analysis of an RFID Security Protocol</title><title>2006 IEEE International Conference on e-Business Engineering (ICEBE'06)</title><addtitle>ICEBE</addtitle><description>Radio frequency identification (RFID) technology is expected to become a critical and ubiquitous infrastructure technology of logistics and supply chain management (SCM) related processes and services. Low-cost has been the key to RFID adoption in many logistics/SCM applications. However, the deployment of such tags may create new threats to user privacy due to the powerful track and trace capabilities of the tags, in addition to tag/reader manufacturing challenges. As a result, some security mechanisms must be imposed on the RFID tags for addressing the privacy problems. This paper provides detailed discussion on our proposal of a lightweight RFID security protocol. It examines the features and issues through experimental analysis pertinent to efficiency and scalability to meet the requirements of the proposed security protocol in metering and payment e-commerce applications</description><subject>Logistics</subject><subject>Manufacturing</subject><subject>Privacy</subject><subject>Proposals</subject><subject>Protocols</subject><subject>Radiofrequency identification</subject><subject>RFID tags</subject><subject>Scalability</subject><subject>Security</subject><subject>Supply chain management</subject><isbn>0769526454</isbn><isbn>9780769526454</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjstKxDAUQAMiqOMsXbnJD7TmcZM0y7F2tDCg6OyHPG6gUtuhqWD_3oKezdkdDiF3nJWcM_vQ1s1jUwrGdAn2gtwwo60SGhRckW3On2xFWtBcXRPR_Jxx6r5wmF1Pd4Prl9xlOibqBvq-b5_oB4bvqZsX-jaN8xjG_pZcJtdn3P57Q4775li_FIfX57beHYqOGzUXKUZTCYsagaNaD6wGayKXqZIedQimgpi88NpYZ6KQEAz4JKKtPKuY3JD7v2yHiKfz-uim5QRMci1B_gISPkDV</recordid><startdate>200610</startdate><enddate>200610</enddate><creator>Zongwei Luo</creator><creator>Chan, T.</creator><creator>Li, J.S.</creator><creator>Wong, E.</creator><creator>Cheung, W.</creator><creator>Ng, V.</creator><creator>Wilton Fok</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200610</creationdate><title>Experimental Analysis of an RFID Security Protocol</title><author>Zongwei Luo ; Chan, T. ; Li, J.S. ; Wong, E. ; Cheung, W. ; Ng, V. ; Wilton Fok</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-fdd7829e6e41e569596497d13f83be6cc784dfb2b679a7d234c74bf2d98b0803</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Logistics</topic><topic>Manufacturing</topic><topic>Privacy</topic><topic>Proposals</topic><topic>Protocols</topic><topic>Radiofrequency identification</topic><topic>RFID tags</topic><topic>Scalability</topic><topic>Security</topic><topic>Supply chain management</topic><toplevel>online_resources</toplevel><creatorcontrib>Zongwei Luo</creatorcontrib><creatorcontrib>Chan, T.</creatorcontrib><creatorcontrib>Li, J.S.</creatorcontrib><creatorcontrib>Wong, E.</creatorcontrib><creatorcontrib>Cheung, W.</creatorcontrib><creatorcontrib>Ng, V.</creatorcontrib><creatorcontrib>Wilton Fok</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zongwei Luo</au><au>Chan, T.</au><au>Li, J.S.</au><au>Wong, E.</au><au>Cheung, W.</au><au>Ng, V.</au><au>Wilton Fok</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Experimental Analysis of an RFID Security Protocol</atitle><btitle>2006 IEEE International Conference on e-Business Engineering (ICEBE'06)</btitle><stitle>ICEBE</stitle><date>2006-10</date><risdate>2006</risdate><spage>62</spage><epage>70</epage><pages>62-70</pages><isbn>0769526454</isbn><isbn>9780769526454</isbn><abstract>Radio frequency identification (RFID) technology is expected to become a critical and ubiquitous infrastructure technology of logistics and supply chain management (SCM) related processes and services. Low-cost has been the key to RFID adoption in many logistics/SCM applications. However, the deployment of such tags may create new threats to user privacy due to the powerful track and trace capabilities of the tags, in addition to tag/reader manufacturing challenges. As a result, some security mechanisms must be imposed on the RFID tags for addressing the privacy problems. This paper provides detailed discussion on our proposal of a lightweight RFID security protocol. It examines the features and issues through experimental analysis pertinent to efficiency and scalability to meet the requirements of the proposed security protocol in metering and payment e-commerce applications</abstract><pub>IEEE</pub><doi>10.1109/ICEBE.2006.49</doi><tpages>9</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 0769526454
ispartof 2006 IEEE International Conference on e-Business Engineering (ICEBE'06), 2006, p.62-70
issn
language eng
recordid cdi_ieee_primary_4031634
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Logistics
Manufacturing
Privacy
Proposals
Protocols
Radiofrequency identification
RFID tags
Scalability
Security
Supply chain management
title Experimental Analysis of an RFID Security Protocol
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T23%3A56%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Experimental%20Analysis%20of%20an%20RFID%20Security%20Protocol&rft.btitle=2006%20IEEE%20International%20Conference%20on%20e-Business%20Engineering%20(ICEBE'06)&rft.au=Zongwei%20Luo&rft.date=2006-10&rft.spage=62&rft.epage=70&rft.pages=62-70&rft.isbn=0769526454&rft.isbn_list=9780769526454&rft_id=info:doi/10.1109/ICEBE.2006.49&rft_dat=%3Cieee_6IE%3E4031634%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4031634&rfr_iscdi=true