{"title":"RFID系统的以服务器为中心的认证协议","authors":"Kaushik P. Chavan, A. Zeid, S. Kamarthi","doi":"10.1109/COASE.2009.5234104","DOIUrl":null,"url":null,"abstract":"A large scale implementation of RFID technology in many practical applications including supply chain and retail stores require the resolution of the either-or dichotomy between low-cost RFID tags and secure RFID systems. This research proposes an approach in which the complexity and hence the cost of RFID tags can be drastically reduce by eliminating the security-assuring computational resources from the RFID tags and placing the security burden on the data processing server. This approach can make it possible to carry out secure transactions even with simple and inexpensive RFID tags. This research investigates a multiple ID authentication protocol based on this approach. The paper presents an empirical formula for the prediction of the performance of the protocol in terms of the number of spoofs per transaction for a given protocol configuration.","PeriodicalId":386046,"journal":{"name":"2009 IEEE International Conference on Automation Science and Engineering","volume":"89 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A server centric authentication protocol for a RFID system\",\"authors\":\"Kaushik P. Chavan, A. Zeid, S. Kamarthi\",\"doi\":\"10.1109/COASE.2009.5234104\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A large scale implementation of RFID technology in many practical applications including supply chain and retail stores require the resolution of the either-or dichotomy between low-cost RFID tags and secure RFID systems. This research proposes an approach in which the complexity and hence the cost of RFID tags can be drastically reduce by eliminating the security-assuring computational resources from the RFID tags and placing the security burden on the data processing server. This approach can make it possible to carry out secure transactions even with simple and inexpensive RFID tags. This research investigates a multiple ID authentication protocol based on this approach. The paper presents an empirical formula for the prediction of the performance of the protocol in terms of the number of spoofs per transaction for a given protocol configuration.\",\"PeriodicalId\":386046,\"journal\":{\"name\":\"2009 IEEE International Conference on Automation Science and Engineering\",\"volume\":\"89 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-08-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 IEEE International Conference on Automation Science and Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COASE.2009.5234104\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE International Conference on Automation Science and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COASE.2009.5234104","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A server centric authentication protocol for a RFID system
A large scale implementation of RFID technology in many practical applications including supply chain and retail stores require the resolution of the either-or dichotomy between low-cost RFID tags and secure RFID systems. This research proposes an approach in which the complexity and hence the cost of RFID tags can be drastically reduce by eliminating the security-assuring computational resources from the RFID tags and placing the security burden on the data processing server. This approach can make it possible to carry out secure transactions even with simple and inexpensive RFID tags. This research investigates a multiple ID authentication protocol based on this approach. The paper presents an empirical formula for the prediction of the performance of the protocol in terms of the number of spoofs per transaction for a given protocol configuration.