{"title":"面向未来RFID应用的简单安全搜索协议","authors":"M. S. Hossain, Sheikh Iqbal Ahamed","doi":"10.1109/FTDCS.2008.21","DOIUrl":null,"url":null,"abstract":"RFID has become a predominant technology in supply chain in the past few years. It's becoming so popular that even it's been used for home environment for personal use. But with the increasing popularity there is also a potential rise of security concern. This concern amongst consumer has led the researcher to concentrate on the potential threats of this technology. The main challenge of a secured RFID protocols is developing a well suited authentication and searching protocol for low cost passive tags which does not have high processing power. As authentication has been addressed more rigorously than the searching, we have chosen to concentrate on developing secured searching for RFID. To date there is no secured searching for passive RFID tags which is not prone to tracking violation, sniffing attack etc. In this paper, we have discussed the problem of a secured searching in depth and proposed a solution for low end tags.","PeriodicalId":414800,"journal":{"name":"2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Towards a Simple Secured Searching Protocol for Future RFID Applications\",\"authors\":\"M. S. Hossain, Sheikh Iqbal Ahamed\",\"doi\":\"10.1109/FTDCS.2008.21\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"RFID has become a predominant technology in supply chain in the past few years. It's becoming so popular that even it's been used for home environment for personal use. But with the increasing popularity there is also a potential rise of security concern. This concern amongst consumer has led the researcher to concentrate on the potential threats of this technology. The main challenge of a secured RFID protocols is developing a well suited authentication and searching protocol for low cost passive tags which does not have high processing power. As authentication has been addressed more rigorously than the searching, we have chosen to concentrate on developing secured searching for RFID. To date there is no secured searching for passive RFID tags which is not prone to tracking violation, sniffing attack etc. In this paper, we have discussed the problem of a secured searching in depth and proposed a solution for low end tags.\",\"PeriodicalId\":414800,\"journal\":{\"name\":\"2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems\",\"volume\":\"68 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-10-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FTDCS.2008.21\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FTDCS.2008.21","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Towards a Simple Secured Searching Protocol for Future RFID Applications
RFID has become a predominant technology in supply chain in the past few years. It's becoming so popular that even it's been used for home environment for personal use. But with the increasing popularity there is also a potential rise of security concern. This concern amongst consumer has led the researcher to concentrate on the potential threats of this technology. The main challenge of a secured RFID protocols is developing a well suited authentication and searching protocol for low cost passive tags which does not have high processing power. As authentication has been addressed more rigorously than the searching, we have chosen to concentrate on developing secured searching for RFID. To date there is no secured searching for passive RFID tags which is not prone to tracking violation, sniffing attack etc. In this paper, we have discussed the problem of a secured searching in depth and proposed a solution for low end tags.