M. Schapranow, J. Muller, S. Enderlein, M. Helmich, A. Zeier
{"title":"使用预定义密码列表的低成本RFID互认证模型","authors":"M. Schapranow, J. Muller, S. Enderlein, M. Helmich, A. Zeier","doi":"10.1109/ICIEEM.2009.5344198","DOIUrl":null,"url":null,"abstract":"The use of RFID tags for storing unique identifiers increases the complexity of existing global supply chains. Companies participating in this RFID-aided supply chains are confronted with new challenges by using RFID technology. Most RFID tags contain no sophisticated data protection mechanisms, because they are primarily designed to be cheap and to carry a very limited amount of data. This lack of data protection introduces various attack scenarios for current and upcoming RFID scenarios. The use of authentication in communication networks prevents third parties to gather access to confidential data. We introduce a mutual authentication model prevent the exposure of RFID communication data between tag and reader based on the implementation of predefined on-tag password lists.","PeriodicalId":6326,"journal":{"name":"2009 16th International Conference on Industrial Engineering and Engineering Management","volume":"58 1","pages":"889-893"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Low-cost mutual RFID authentication model using predefined password lists\",\"authors\":\"M. Schapranow, J. Muller, S. Enderlein, M. Helmich, A. Zeier\",\"doi\":\"10.1109/ICIEEM.2009.5344198\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The use of RFID tags for storing unique identifiers increases the complexity of existing global supply chains. Companies participating in this RFID-aided supply chains are confronted with new challenges by using RFID technology. Most RFID tags contain no sophisticated data protection mechanisms, because they are primarily designed to be cheap and to carry a very limited amount of data. This lack of data protection introduces various attack scenarios for current and upcoming RFID scenarios. The use of authentication in communication networks prevents third parties to gather access to confidential data. We introduce a mutual authentication model prevent the exposure of RFID communication data between tag and reader based on the implementation of predefined on-tag password lists.\",\"PeriodicalId\":6326,\"journal\":{\"name\":\"2009 16th International Conference on Industrial Engineering and Engineering Management\",\"volume\":\"58 1\",\"pages\":\"889-893\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 16th International Conference on Industrial Engineering and Engineering Management\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIEEM.2009.5344198\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 16th International Conference on Industrial Engineering and Engineering Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIEEM.2009.5344198","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Low-cost mutual RFID authentication model using predefined password lists
The use of RFID tags for storing unique identifiers increases the complexity of existing global supply chains. Companies participating in this RFID-aided supply chains are confronted with new challenges by using RFID technology. Most RFID tags contain no sophisticated data protection mechanisms, because they are primarily designed to be cheap and to carry a very limited amount of data. This lack of data protection introduces various attack scenarios for current and upcoming RFID scenarios. The use of authentication in communication networks prevents third parties to gather access to confidential data. We introduce a mutual authentication model prevent the exposure of RFID communication data between tag and reader based on the implementation of predefined on-tag password lists.