Anahita Vyas, Sheikh Iqbal Ahamed, Munirul M. Haque, Madhavi V. S. Jayanthi
{"title":"一种可靠的RFID安全轻量级解决方案","authors":"Anahita Vyas, Sheikh Iqbal Ahamed, Munirul M. Haque, Madhavi V. S. Jayanthi","doi":"10.1109/AINAW.2007.48","DOIUrl":null,"url":null,"abstract":"The ubiquitous adoption of RFID technology is becoming integral part of our life. The stringent behavior of RFID system makes it more prone to impendence situations. Consequently, it needs more enduring and testing to become less susceptible to attacks without compromising the crucial key factors like, memory, cost, speed, computation and handling. An approach without concerning all these factors is not an acceptable approach. In this paper, we present a more persistent solution that provides security without compromising the crucial key factors and addressing all security issues like eavesdropping, tracking, cloning and replay attacks.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Robust Lightweight Solution for RFID Security\",\"authors\":\"Anahita Vyas, Sheikh Iqbal Ahamed, Munirul M. Haque, Madhavi V. S. Jayanthi\",\"doi\":\"10.1109/AINAW.2007.48\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The ubiquitous adoption of RFID technology is becoming integral part of our life. The stringent behavior of RFID system makes it more prone to impendence situations. Consequently, it needs more enduring and testing to become less susceptible to attacks without compromising the crucial key factors like, memory, cost, speed, computation and handling. An approach without concerning all these factors is not an acceptable approach. In this paper, we present a more persistent solution that provides security without compromising the crucial key factors and addressing all security issues like eavesdropping, tracking, cloning and replay attacks.\",\"PeriodicalId\":338799,\"journal\":{\"name\":\"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-05-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AINAW.2007.48\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINAW.2007.48","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The ubiquitous adoption of RFID technology is becoming integral part of our life. The stringent behavior of RFID system makes it more prone to impendence situations. Consequently, it needs more enduring and testing to become less susceptible to attacks without compromising the crucial key factors like, memory, cost, speed, computation and handling. An approach without concerning all these factors is not an acceptable approach. In this paper, we present a more persistent solution that provides security without compromising the crucial key factors and addressing all security issues like eavesdropping, tracking, cloning and replay attacks.