Macedo Firmino, G. B. Brandao, A. Guerreiro, R. Valentim
{"title":"神经密码技术应用于RFID系统中具有互认证的密钥管理协议","authors":"Macedo Firmino, G. B. Brandao, A. Guerreiro, R. Valentim","doi":"10.1109/ICITST.2009.5402512","DOIUrl":null,"url":null,"abstract":"RFID (radio frequency identification) is an emerging technology, for automatic identification and tracking, to provide increased efficiency and decrease operating costs in industry and supply chain. However, existing international standards not include security specifications, which resulted in appearance of security threats. Many efforts have been done in this area. However, the key management protocols proposed are unsafe or impractical for most RFID systems. This paper presents a novel approach of a key management protocol with mutual authentication for RFID systems. This protocol is an extension of RFID systems for the protocol proposed by Kinzel and Kanter , adding to the original protocol: a mutual authentication and the definition of frames. Through simulations it was possible to observe that the security level of the proposed protocol is a function only of the computational resources of the entities in the RFID system.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Neural cryptography applied to key management protocol with mutual authentication in RFID systems\",\"authors\":\"Macedo Firmino, G. B. Brandao, A. Guerreiro, R. Valentim\",\"doi\":\"10.1109/ICITST.2009.5402512\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"RFID (radio frequency identification) is an emerging technology, for automatic identification and tracking, to provide increased efficiency and decrease operating costs in industry and supply chain. However, existing international standards not include security specifications, which resulted in appearance of security threats. Many efforts have been done in this area. However, the key management protocols proposed are unsafe or impractical for most RFID systems. This paper presents a novel approach of a key management protocol with mutual authentication for RFID systems. This protocol is an extension of RFID systems for the protocol proposed by Kinzel and Kanter , adding to the original protocol: a mutual authentication and the definition of frames. Through simulations it was possible to observe that the security level of the proposed protocol is a function only of the computational resources of the entities in the RFID system.\",\"PeriodicalId\":251169,\"journal\":{\"name\":\"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITST.2009.5402512\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITST.2009.5402512","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Neural cryptography applied to key management protocol with mutual authentication in RFID systems
RFID (radio frequency identification) is an emerging technology, for automatic identification and tracking, to provide increased efficiency and decrease operating costs in industry and supply chain. However, existing international standards not include security specifications, which resulted in appearance of security threats. Many efforts have been done in this area. However, the key management protocols proposed are unsafe or impractical for most RFID systems. This paper presents a novel approach of a key management protocol with mutual authentication for RFID systems. This protocol is an extension of RFID systems for the protocol proposed by Kinzel and Kanter , adding to the original protocol: a mutual authentication and the definition of frames. Through simulations it was possible to observe that the security level of the proposed protocol is a function only of the computational resources of the entities in the RFID system.