Trusted anonymizer-based RFID system with integrity verification
RFID technology is considered as an advanced identification system because it can communicate through wireless communication. However, the unprotected wireless communication channel opens up many possibilities of these tags being tracked by illegal reader which violates data privacy. Past works reve...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 103 |
---|---|
container_issue | |
container_start_page | 98 |
container_title | |
container_volume | |
creator | Mubarak, M. F. Manan, J. A. Yahya, S. |
description | RFID technology is considered as an advanced identification system because it can communicate through wireless communication. However, the unprotected wireless communication channel opens up many possibilities of these tags being tracked by illegal reader which violates data privacy. Past works revealed that RFID tags would be the easy target of attacks related to system security and data privacy. The more advanced RFID technology can embed its applications in hand-held devices such as NFC type of mobile phones and biometric devices. This would again become vulnerable to attacks on its RFID components. Past works on RFID with anonymizers have dealt with lots of issues regarding system integrity and availability. However, the corresponding solutions have focused solely on the RFID tag. In this paper, we propose a trusted anonymizer-based RFID system integrity verification with emphasis on using mutual attestation process to provide system integrity to the whole system including every other component within RFID system. |
doi_str_mv | 10.1109/ISIAS.2011.6122802 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6122802</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6122802</ieee_id><sourcerecordid>6122802</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-58b4f44aa9243e84141f0cb21f20b4c3af3aa923ede41857548add984cb917063</originalsourceid><addsrcrecordid>eNpVT8FKxDAUjIigrP0BvfQHWvOSlya5uazuWlgQ3N6XtE00YruSRKV-vRX34lyGmYEZhpAroCUA1Tf1rl7uSkYBygoYU5SdkExLBSikZCCEPP2nkZ6TLMZXOqOqNENxQW6b8BGT7XMzHsZp8N82FK2Js_G0ru_yOM3hkH_59JL7Mdnn4NOUf9rgne9M8ofxkpw58xZtduQFadb3zeqh2D5u6tVyW3hNUyFUiw7RmHmVW4WA4GjXMnCMtthx4_hvxm1vEZSQApXpe62wazVIWvEFuf6r9dba_XvwgwnT_nib_wC5s0tP</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Trusted anonymizer-based RFID system with integrity verification</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Mubarak, M. F. ; Manan, J. A. ; Yahya, S.</creator><creatorcontrib>Mubarak, M. F. ; Manan, J. A. ; Yahya, S.</creatorcontrib><description>RFID technology is considered as an advanced identification system because it can communicate through wireless communication. However, the unprotected wireless communication channel opens up many possibilities of these tags being tracked by illegal reader which violates data privacy. Past works revealed that RFID tags would be the easy target of attacks related to system security and data privacy. The more advanced RFID technology can embed its applications in hand-held devices such as NFC type of mobile phones and biometric devices. This would again become vulnerable to attacks on its RFID components. Past works on RFID with anonymizers have dealt with lots of issues regarding system integrity and availability. However, the corresponding solutions have focused solely on the RFID tag. In this paper, we propose a trusted anonymizer-based RFID system integrity verification with emphasis on using mutual attestation process to provide system integrity to the whole system including every other component within RFID system.</description><identifier>ISBN: 9781457721540</identifier><identifier>ISBN: 1457721546</identifier><identifier>EISBN: 9781457721557</identifier><identifier>EISBN: 9781457721533</identifier><identifier>EISBN: 1457721538</identifier><identifier>EISBN: 1457721554</identifier><identifier>DOI: 10.1109/ISIAS.2011.6122802</identifier><language>eng</language><publisher>IEEE</publisher><subject>Anonymizer ; Data privacy ; Encryption ; Privacy ; Protocols ; Radiofrequency identification ; RFID ; Security ; Servers ; System Trust ; TPM</subject><ispartof>2011 7th International Conference on Information Assurance and Security (IAS), 2011, p.98-103</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6122802$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6122802$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Mubarak, M. F.</creatorcontrib><creatorcontrib>Manan, J. A.</creatorcontrib><creatorcontrib>Yahya, S.</creatorcontrib><title>Trusted anonymizer-based RFID system with integrity verification</title><title>2011 7th International Conference on Information Assurance and Security (IAS)</title><addtitle>ISIAS</addtitle><description>RFID technology is considered as an advanced identification system because it can communicate through wireless communication. However, the unprotected wireless communication channel opens up many possibilities of these tags being tracked by illegal reader which violates data privacy. Past works revealed that RFID tags would be the easy target of attacks related to system security and data privacy. The more advanced RFID technology can embed its applications in hand-held devices such as NFC type of mobile phones and biometric devices. This would again become vulnerable to attacks on its RFID components. Past works on RFID with anonymizers have dealt with lots of issues regarding system integrity and availability. However, the corresponding solutions have focused solely on the RFID tag. In this paper, we propose a trusted anonymizer-based RFID system integrity verification with emphasis on using mutual attestation process to provide system integrity to the whole system including every other component within RFID system.</description><subject>Anonymizer</subject><subject>Data privacy</subject><subject>Encryption</subject><subject>Privacy</subject><subject>Protocols</subject><subject>Radiofrequency identification</subject><subject>RFID</subject><subject>Security</subject><subject>Servers</subject><subject>System Trust</subject><subject>TPM</subject><isbn>9781457721540</isbn><isbn>1457721546</isbn><isbn>9781457721557</isbn><isbn>9781457721533</isbn><isbn>1457721538</isbn><isbn>1457721554</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVT8FKxDAUjIigrP0BvfQHWvOSlya5uazuWlgQ3N6XtE00YruSRKV-vRX34lyGmYEZhpAroCUA1Tf1rl7uSkYBygoYU5SdkExLBSikZCCEPP2nkZ6TLMZXOqOqNENxQW6b8BGT7XMzHsZp8N82FK2Js_G0ru_yOM3hkH_59JL7Mdnn4NOUf9rgne9M8ofxkpw58xZtduQFadb3zeqh2D5u6tVyW3hNUyFUiw7RmHmVW4WA4GjXMnCMtthx4_hvxm1vEZSQApXpe62wazVIWvEFuf6r9dba_XvwgwnT_nib_wC5s0tP</recordid><startdate>201112</startdate><enddate>201112</enddate><creator>Mubarak, M. F.</creator><creator>Manan, J. A.</creator><creator>Yahya, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201112</creationdate><title>Trusted anonymizer-based RFID system with integrity verification</title><author>Mubarak, M. F. ; Manan, J. A. ; Yahya, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-58b4f44aa9243e84141f0cb21f20b4c3af3aa923ede41857548add984cb917063</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Anonymizer</topic><topic>Data privacy</topic><topic>Encryption</topic><topic>Privacy</topic><topic>Protocols</topic><topic>Radiofrequency identification</topic><topic>RFID</topic><topic>Security</topic><topic>Servers</topic><topic>System Trust</topic><topic>TPM</topic><toplevel>online_resources</toplevel><creatorcontrib>Mubarak, M. F.</creatorcontrib><creatorcontrib>Manan, J. A.</creatorcontrib><creatorcontrib>Yahya, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Mubarak, M. F.</au><au>Manan, J. A.</au><au>Yahya, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Trusted anonymizer-based RFID system with integrity verification</atitle><btitle>2011 7th International Conference on Information Assurance and Security (IAS)</btitle><stitle>ISIAS</stitle><date>2011-12</date><risdate>2011</risdate><spage>98</spage><epage>103</epage><pages>98-103</pages><isbn>9781457721540</isbn><isbn>1457721546</isbn><eisbn>9781457721557</eisbn><eisbn>9781457721533</eisbn><eisbn>1457721538</eisbn><eisbn>1457721554</eisbn><abstract>RFID technology is considered as an advanced identification system because it can communicate through wireless communication. However, the unprotected wireless communication channel opens up many possibilities of these tags being tracked by illegal reader which violates data privacy. Past works revealed that RFID tags would be the easy target of attacks related to system security and data privacy. The more advanced RFID technology can embed its applications in hand-held devices such as NFC type of mobile phones and biometric devices. This would again become vulnerable to attacks on its RFID components. Past works on RFID with anonymizers have dealt with lots of issues regarding system integrity and availability. However, the corresponding solutions have focused solely on the RFID tag. In this paper, we propose a trusted anonymizer-based RFID system integrity verification with emphasis on using mutual attestation process to provide system integrity to the whole system including every other component within RFID system.</abstract><pub>IEEE</pub><doi>10.1109/ISIAS.2011.6122802</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781457721540 |
ispartof | 2011 7th International Conference on Information Assurance and Security (IAS), 2011, p.98-103 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6122802 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Anonymizer Data privacy Encryption Privacy Protocols Radiofrequency identification RFID Security Servers System Trust TPM |
title | Trusted anonymizer-based RFID system with integrity verification |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T20%3A03%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Trusted%20anonymizer-based%20RFID%20system%20with%20integrity%20verification&rft.btitle=2011%207th%20International%20Conference%20on%20Information%20Assurance%20and%20Security%20(IAS)&rft.au=Mubarak,%20M.%20F.&rft.date=2011-12&rft.spage=98&rft.epage=103&rft.pages=98-103&rft.isbn=9781457721540&rft.isbn_list=1457721546&rft_id=info:doi/10.1109/ISIAS.2011.6122802&rft_dat=%3Cieee_6IE%3E6122802%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781457721557&rft.eisbn_list=9781457721533&rft.eisbn_list=1457721538&rft.eisbn_list=1457721554&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6122802&rfr_iscdi=true |