An improved proof for RFID tags
An RFID system consists of an RFID reader, a server connected to a database, and RFID tags attached to the objects needed to be identified. We are interested in the case where two tags are needed to be simultaneously scanned in a readerpsilas field, for which many protocols have been proposed in lit...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | An RFID system consists of an RFID reader, a server connected to a database, and RFID tags attached to the objects needed to be identified. We are interested in the case where two tags are needed to be simultaneously scanned in a readerpsilas field, for which many protocols have been proposed in literature. They however are all insecure for the special case, where an adversary, acting as a reader, can penetrate the server and access data stored in the server. In this paper, we propose a protocol to remedy this problem for two-tag environment. In addition, it can be extended to more-than-two-tag environment without much increasing total amount of time to scan all the tags. |
---|---|
DOI: | 10.1109/ECTICON.2008.4600536 |