메뉴 건너뛰기




Volumn , Issue , 2011, Pages 134-141

Improving security and usability of low cost RFID tags

Author keywords

EPC Class1 Gen 2 tag; RFID security; tag cloning; tamper detection

Indexed keywords

CHAOTIC MAP; DATA STANDARDS; DATA TAMPERING; EM FIELD; EPC CLASS1 GEN 2 TAG; EPCGLOBAL; GLOBAL STANDARDIZATION; LOW COSTS; PASSIVE RFID; PASSWORD MANAGEMENT; PSEUDO RANDOM NUMBER GENERATORS; RF-ID TAGS; RFID APPLICATIONS; RFID SECURITY; SECURITY CHALLENGES; SECURITY SOLUTIONS; TAG CLONING; TAMPER DETECTION;

EID: 80052085122     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PST.2011.5971975     Document Type: Conference Paper
Times cited : (9)

References (22)
  • 1
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • DOI 10.1109/JSAC.2005.861395
    • Juels, A. : RFID Security and Privacy: A Research Survey, An invited paper, IEEE Journal on Selected Areas in Communications, vol. 24 no. 2, pp. 381-394, February 2006. (Pubitemid 43269757)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 2
    • 77649263434 scopus 로고    scopus 로고
    • Privacy enhancing technologies for RFID-A critical investigation of state of the art research
    • Spiekermann,S. , Evdokimov, S. :Privacy Enhancing Technologies for RFID-A Critical Investigation of State of the Art Research,IEEE Privacy and Security 2009, 2009.
    • (2009) IEEE Privacy and Security , vol.2009
    • Spiekermann, S.1    Evdokimov, S.2
  • 4
    • 80052086805 scopus 로고    scopus 로고
    • Accessed on March
    • RFIDExchange, Accessed on March 11, 2010. http://www.rfidexchange.com/ applications.aspx
    • (2010) , vol.11
  • 6
    • 80052088199 scopus 로고    scopus 로고
    • RFID's security challenge-security and its high cost appears to be the next hurdle in the widespread adoption of RFID
    • Accessed on March11
    • Claburn, T. , Hulme, G. , V. : RFID's Security Challenge- Security and its high cost appears to be the next hurdle in the widespread adoption of RFID. In InformationWeek, Accessed on March11,2010. http://www.informationweek. com/story/showArticle. jhtml?articleID=5 2601030
    • (2010) Information Week , pp. 2601030
    • Claburn, T.1    Hulme, G.V.2
  • 7
    • 58049141225 scopus 로고    scopus 로고
    • From identification to authentication-a review of RFID product authentication techniques
    • Graz: Springer Verlag
    • Lehtonen, M. , et al. : From Identification to Authentication-A Review of RFID Product Authentication Techniques. in Workshop on RFID Security 2006 (RFIDSec 06). 2006. Graz: Springer Verlag.
    • (2006) Workshop on RFID Security 2006 (RFIDSec 06)
    • Lehtonen, M.1
  • 8
    • 80052077584 scopus 로고    scopus 로고
    • ISO/IEC, ISO/IEC 18000-6 Part 6:Parameters for air interface communications at 860 MHz to 960 MHz AMENDMENT 1: Extension with Type C and update of Types A and B, 2006
    • ISO/IEC, ISO/IEC 18000-6 Part 6:Parameters for air interface communications at 860 MHz to 960 MHz AMENDMENT 1: Extension with Type C and update of Types A and B, 2006.
  • 15
    • 54349101762 scopus 로고    scopus 로고
    • Ribagorda, LAMED-A PRNG for EPC Class-1 Generation-2 RFID specification
    • Elsevier Science Publishers B.
    • Peris-Lopez, Pedro and Hernandez-Castro, Julio Cesar and Estevez-Tapiador, Juan M. and Ribagorda, LAMED-A PRNG for EPC Class-1 Generation-2 RFID specification,Comput. Stand. Interfaces. vol. 31,no 1,pp. 88-97,Elsevier Science Publishers B. V. (2009)
    • (2009) Comput. Stand. Interfaces. , vol.31 , Issue.1 , pp. 88-97
    • Pedro, P.-L.1    Julio Cesar, H.-C.2    Tapiador, E.3    Juan, M.4
  • 18
    • 67650490215 scopus 로고    scopus 로고
    • Tamper discrimination in RFID tags using chaotic fragile watermark
    • Wireless Communications and Trusted Computing
    • M. Fan, H. Wang, Tamper Discrimination in RFID Tags Using Chaotic Fragile Watermark, In. International Conference on Network Security, Wireless Communications and Trusted Computing, 09, pp. 147-150, 2009.
    • (2009) International Conference on Network Security , vol.9 , pp. 147-150
    • Fan, M.1    Wang, H.2
  • 21
    • 77956135384 scopus 로고    scopus 로고
    • Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags
    • Financial Cryptography and Data Security Workshops, Springer, Pages 34-46. Tenerife (Spain), Jan.
    • J. Melia-Segui, J. Garcia-Alfaro, J. Herrera-Joancomarti. Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags. LNCS, vol. 6054 Financial Cryptography and Data Security Workshops, Springer, Pages 34-46. Tenerife (Spain), Jan. 2010.
    • (2010) LNCS , vol.6054
    • Melia-Segui, J.1    Garcia-Alfaro, J.2    Herrera-Joancomarti, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.