{"title":"Controlling Physical Objects with Privacy using Secure RFID System","authors":"Fahad Samad, Sadeq Ali Makram","doi":"10.1109/NTMS.2008.ECP.33","DOIUrl":null,"url":null,"abstract":"Security and privacy threats in technological environment are great hindrances to use latest technologies for our benefits. Such threats also exist in RFID systems which are currently utilized to a great extent in ubiquitous communication. These systems can also work in combination with cellular networks to control user's physical objects in a secure way with sufficient privacy. This paper presents a secure system model which enables a user to control his possessions even sitting remotely from the objects' locations. The limitations of RFID tags are taken into account and it is shown that the system mitigates many threats keeping the privacy of the tags and the user intact.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 New Technologies, Mobility and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NTMS.2008.ECP.33","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Security and privacy threats in technological environment are great hindrances to use latest technologies for our benefits. Such threats also exist in RFID systems which are currently utilized to a great extent in ubiquitous communication. These systems can also work in combination with cellular networks to control user's physical objects in a secure way with sufficient privacy. This paper presents a secure system model which enables a user to control his possessions even sitting remotely from the objects' locations. The limitations of RFID tags are taken into account and it is shown that the system mitigates many threats keeping the privacy of the tags and the user intact.