DocumentCode :
2229307
Title :
Severless Search and Authentication Protocols for RFID
Author :
Tan, Chiu C. ; Sheng, Bo ; Li, Qun
Author_Institution :
Dept. of Comput. Sci., William & Mary Coll., Williamsburg, VA
fYear :
2007
fDate :
19-23 March 2007
Firstpage :
3
Lastpage :
12
Abstract :
With the increasing popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection to users. Most recent RFID protocols use a central database to store the RFID tag data. An RFID reader first queries the RFID tag and returns the reply to the database. After authentication, the database returns the tag data to the reader. In this paper, we proposed a more flexible authentication protocol that provides comparable protection without the need for a central database. We also suggest a protocol for secure search for RFID tags. We believe that as RFID applications become widespread, the ability to search for RFID tags will be increasingly useful
Keywords :
data privacy; protocols; radiofrequency identification; telecommunication security; RFID tag data; central database; privacy protection; search-authentication protocols; Access protocols; Authentication; Computer science; Data security; Databases; Educational institutions; Privacy; Protection; RFID tags; Radiofrequency identification;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Pervasive Computing and Communications, 2007. PerCom '07. Fifth Annual IEEE International Conference on
Conference_Location :
White Plains, NY
Print_ISBN :
0-7695-2787-6
Type :
conf
DOI :
10.1109/PERCOM.2007.30
Filename :
4144745
Link To Document :
بازگشت