S. Pahuja, S. Negi, A. Verma, P. Rathi, N. Narang, R. Chawla
{"title":"用于安全标签阅读器通信的认证协议","authors":"S. Pahuja, S. Negi, A. Verma, P. Rathi, N. Narang, R. Chawla","doi":"10.1109/SCEECS.2012.6184757","DOIUrl":null,"url":null,"abstract":"RFID (Radio Frequency IDentiflcation) is recently becoming popular, and plays an important role in ubiquitous society due to its deploying convenience and economic efficiency. Furthermore, RFID nowadays comes into the spotlight as a technology to substitute the barcode system. RFID technology, on the other hand, is jeopardized from various attacks and problems preventing widespread RFID deployment. We focus ourselves on designing a secure and efficient protocol for authentication between tag and reader in a RFID system. There must be a tradeoff between scalability and untraceability. However, we try to keep the constant computational time in back-end server regardless of the number of tags when designing an untraceable protocol.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"An authentication protocol for secure tag-reader communication\",\"authors\":\"S. Pahuja, S. Negi, A. Verma, P. Rathi, N. Narang, R. Chawla\",\"doi\":\"10.1109/SCEECS.2012.6184757\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"RFID (Radio Frequency IDentiflcation) is recently becoming popular, and plays an important role in ubiquitous society due to its deploying convenience and economic efficiency. Furthermore, RFID nowadays comes into the spotlight as a technology to substitute the barcode system. RFID technology, on the other hand, is jeopardized from various attacks and problems preventing widespread RFID deployment. We focus ourselves on designing a secure and efficient protocol for authentication between tag and reader in a RFID system. There must be a tradeoff between scalability and untraceability. However, we try to keep the constant computational time in back-end server regardless of the number of tags when designing an untraceable protocol.\",\"PeriodicalId\":372799,\"journal\":{\"name\":\"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SCEECS.2012.6184757\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SCEECS.2012.6184757","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
摘要
射频识别技术(RFID, Radio Frequency identification)近年来逐渐普及,以其部署方便、经济高效的特点在无所不在的社会中发挥着重要作用。此外,RFID作为一种替代条形码系统的技术,目前已成为人们关注的焦点。另一方面,RFID技术受到各种攻击和阻碍RFID广泛部署的问题的危害。我们致力于在RFID系统中设计一种安全高效的标签与读写器认证协议。必须在可伸缩性和不可追溯性之间进行权衡。然而,在设计不可跟踪协议时,无论标记的数量如何,我们都试图保持后端服务器的计算时间不变。
An authentication protocol for secure tag-reader communication
RFID (Radio Frequency IDentiflcation) is recently becoming popular, and plays an important role in ubiquitous society due to its deploying convenience and economic efficiency. Furthermore, RFID nowadays comes into the spotlight as a technology to substitute the barcode system. RFID technology, on the other hand, is jeopardized from various attacks and problems preventing widespread RFID deployment. We focus ourselves on designing a secure and efficient protocol for authentication between tag and reader in a RFID system. There must be a tradeoff between scalability and untraceability. However, we try to keep the constant computational time in back-end server regardless of the number of tags when designing an untraceable protocol.