Trusted anonymizer-based RFID system with integrity verification

RFID technology is considered as an advanced identification system because it can communicate through wireless communication. However, the unprotected wireless communication channel opens up many possibilities of these tags being tracked by illegal reader which violates data privacy. Past works reve...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Mubarak, M. F., Manan, J. A., Yahya, S.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 103
container_issue
container_start_page 98
container_title
container_volume
creator Mubarak, M. F.
Manan, J. A.
Yahya, S.
description RFID technology is considered as an advanced identification system because it can communicate through wireless communication. However, the unprotected wireless communication channel opens up many possibilities of these tags being tracked by illegal reader which violates data privacy. Past works revealed that RFID tags would be the easy target of attacks related to system security and data privacy. The more advanced RFID technology can embed its applications in hand-held devices such as NFC type of mobile phones and biometric devices. This would again become vulnerable to attacks on its RFID components. Past works on RFID with anonymizers have dealt with lots of issues regarding system integrity and availability. However, the corresponding solutions have focused solely on the RFID tag. In this paper, we propose a trusted anonymizer-based RFID system integrity verification with emphasis on using mutual attestation process to provide system integrity to the whole system including every other component within RFID system.
doi_str_mv 10.1109/ISIAS.2011.6122802
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6122802</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6122802</ieee_id><sourcerecordid>6122802</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-58b4f44aa9243e84141f0cb21f20b4c3af3aa923ede41857548add984cb917063</originalsourceid><addsrcrecordid>eNpVT8FKxDAUjIigrP0BvfQHWvOSlya5uazuWlgQ3N6XtE00YruSRKV-vRX34lyGmYEZhpAroCUA1Tf1rl7uSkYBygoYU5SdkExLBSikZCCEPP2nkZ6TLMZXOqOqNENxQW6b8BGT7XMzHsZp8N82FK2Js_G0ru_yOM3hkH_59JL7Mdnn4NOUf9rgne9M8ofxkpw58xZtduQFadb3zeqh2D5u6tVyW3hNUyFUiw7RmHmVW4WA4GjXMnCMtthx4_hvxm1vEZSQApXpe62wazVIWvEFuf6r9dba_XvwgwnT_nib_wC5s0tP</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Trusted anonymizer-based RFID system with integrity verification</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Mubarak, M. F. ; Manan, J. A. ; Yahya, S.</creator><creatorcontrib>Mubarak, M. F. ; Manan, J. A. ; Yahya, S.</creatorcontrib><description>RFID technology is considered as an advanced identification system because it can communicate through wireless communication. However, the unprotected wireless communication channel opens up many possibilities of these tags being tracked by illegal reader which violates data privacy. Past works revealed that RFID tags would be the easy target of attacks related to system security and data privacy. The more advanced RFID technology can embed its applications in hand-held devices such as NFC type of mobile phones and biometric devices. This would again become vulnerable to attacks on its RFID components. Past works on RFID with anonymizers have dealt with lots of issues regarding system integrity and availability. However, the corresponding solutions have focused solely on the RFID tag. In this paper, we propose a trusted anonymizer-based RFID system integrity verification with emphasis on using mutual attestation process to provide system integrity to the whole system including every other component within RFID system.</description><identifier>ISBN: 9781457721540</identifier><identifier>ISBN: 1457721546</identifier><identifier>EISBN: 9781457721557</identifier><identifier>EISBN: 9781457721533</identifier><identifier>EISBN: 1457721538</identifier><identifier>EISBN: 1457721554</identifier><identifier>DOI: 10.1109/ISIAS.2011.6122802</identifier><language>eng</language><publisher>IEEE</publisher><subject>Anonymizer ; Data privacy ; Encryption ; Privacy ; Protocols ; Radiofrequency identification ; RFID ; Security ; Servers ; System Trust ; TPM</subject><ispartof>2011 7th International Conference on Information Assurance and Security (IAS), 2011, p.98-103</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6122802$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6122802$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Mubarak, M. F.</creatorcontrib><creatorcontrib>Manan, J. A.</creatorcontrib><creatorcontrib>Yahya, S.</creatorcontrib><title>Trusted anonymizer-based RFID system with integrity verification</title><title>2011 7th International Conference on Information Assurance and Security (IAS)</title><addtitle>ISIAS</addtitle><description>RFID technology is considered as an advanced identification system because it can communicate through wireless communication. However, the unprotected wireless communication channel opens up many possibilities of these tags being tracked by illegal reader which violates data privacy. Past works revealed that RFID tags would be the easy target of attacks related to system security and data privacy. The more advanced RFID technology can embed its applications in hand-held devices such as NFC type of mobile phones and biometric devices. This would again become vulnerable to attacks on its RFID components. Past works on RFID with anonymizers have dealt with lots of issues regarding system integrity and availability. However, the corresponding solutions have focused solely on the RFID tag. In this paper, we propose a trusted anonymizer-based RFID system integrity verification with emphasis on using mutual attestation process to provide system integrity to the whole system including every other component within RFID system.</description><subject>Anonymizer</subject><subject>Data privacy</subject><subject>Encryption</subject><subject>Privacy</subject><subject>Protocols</subject><subject>Radiofrequency identification</subject><subject>RFID</subject><subject>Security</subject><subject>Servers</subject><subject>System Trust</subject><subject>TPM</subject><isbn>9781457721540</isbn><isbn>1457721546</isbn><isbn>9781457721557</isbn><isbn>9781457721533</isbn><isbn>1457721538</isbn><isbn>1457721554</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVT8FKxDAUjIigrP0BvfQHWvOSlya5uazuWlgQ3N6XtE00YruSRKV-vRX34lyGmYEZhpAroCUA1Tf1rl7uSkYBygoYU5SdkExLBSikZCCEPP2nkZ6TLMZXOqOqNENxQW6b8BGT7XMzHsZp8N82FK2Js_G0ru_yOM3hkH_59JL7Mdnn4NOUf9rgne9M8ofxkpw58xZtduQFadb3zeqh2D5u6tVyW3hNUyFUiw7RmHmVW4WA4GjXMnCMtthx4_hvxm1vEZSQApXpe62wazVIWvEFuf6r9dba_XvwgwnT_nib_wC5s0tP</recordid><startdate>201112</startdate><enddate>201112</enddate><creator>Mubarak, M. F.</creator><creator>Manan, J. A.</creator><creator>Yahya, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201112</creationdate><title>Trusted anonymizer-based RFID system with integrity verification</title><author>Mubarak, M. F. ; Manan, J. A. ; Yahya, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-58b4f44aa9243e84141f0cb21f20b4c3af3aa923ede41857548add984cb917063</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Anonymizer</topic><topic>Data privacy</topic><topic>Encryption</topic><topic>Privacy</topic><topic>Protocols</topic><topic>Radiofrequency identification</topic><topic>RFID</topic><topic>Security</topic><topic>Servers</topic><topic>System Trust</topic><topic>TPM</topic><toplevel>online_resources</toplevel><creatorcontrib>Mubarak, M. F.</creatorcontrib><creatorcontrib>Manan, J. A.</creatorcontrib><creatorcontrib>Yahya, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Mubarak, M. F.</au><au>Manan, J. A.</au><au>Yahya, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Trusted anonymizer-based RFID system with integrity verification</atitle><btitle>2011 7th International Conference on Information Assurance and Security (IAS)</btitle><stitle>ISIAS</stitle><date>2011-12</date><risdate>2011</risdate><spage>98</spage><epage>103</epage><pages>98-103</pages><isbn>9781457721540</isbn><isbn>1457721546</isbn><eisbn>9781457721557</eisbn><eisbn>9781457721533</eisbn><eisbn>1457721538</eisbn><eisbn>1457721554</eisbn><abstract>RFID technology is considered as an advanced identification system because it can communicate through wireless communication. However, the unprotected wireless communication channel opens up many possibilities of these tags being tracked by illegal reader which violates data privacy. Past works revealed that RFID tags would be the easy target of attacks related to system security and data privacy. The more advanced RFID technology can embed its applications in hand-held devices such as NFC type of mobile phones and biometric devices. This would again become vulnerable to attacks on its RFID components. Past works on RFID with anonymizers have dealt with lots of issues regarding system integrity and availability. However, the corresponding solutions have focused solely on the RFID tag. In this paper, we propose a trusted anonymizer-based RFID system integrity verification with emphasis on using mutual attestation process to provide system integrity to the whole system including every other component within RFID system.</abstract><pub>IEEE</pub><doi>10.1109/ISIAS.2011.6122802</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781457721540
ispartof 2011 7th International Conference on Information Assurance and Security (IAS), 2011, p.98-103
issn
language eng
recordid cdi_ieee_primary_6122802
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Anonymizer
Data privacy
Encryption
Privacy
Protocols
Radiofrequency identification
RFID
Security
Servers
System Trust
TPM
title Trusted anonymizer-based RFID system with integrity verification
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T20%3A03%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Trusted%20anonymizer-based%20RFID%20system%20with%20integrity%20verification&rft.btitle=2011%207th%20International%20Conference%20on%20Information%20Assurance%20and%20Security%20(IAS)&rft.au=Mubarak,%20M.%20F.&rft.date=2011-12&rft.spage=98&rft.epage=103&rft.pages=98-103&rft.isbn=9781457721540&rft.isbn_list=1457721546&rft_id=info:doi/10.1109/ISIAS.2011.6122802&rft_dat=%3Cieee_6IE%3E6122802%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781457721557&rft.eisbn_list=9781457721533&rft.eisbn_list=1457721538&rft.eisbn_list=1457721554&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6122802&rfr_iscdi=true