DocumentCode :
3341489
Title :
Neural cryptography applied to key management protocol with mutual authentication in RFID systems
Author :
Firmino, M. ; Brandao, G.B. ; Guerreiro, A.M.G. ; de M Valentim, R.A.
Author_Institution :
Dept. of Comput. Eng. & Autom., Fed. Univ. of Rio Grande do Norte, Natal, Brazil
fYear :
2009
fDate :
9-12 Nov. 2009
Firstpage :
1
Lastpage :
6
Abstract :
RFID (radio frequency identification) is an emerging technology, for automatic identification and tracking, to provide increased efficiency and decrease operating costs in industry and supply chain. However, existing international standards not include security specifications, which resulted in appearance of security threats. Many efforts have been done in this area. However, the key management protocols proposed are unsafe or impractical for most RFID systems. This paper presents a novel approach of a key management protocol with mutual authentication for RFID systems. This protocol is an extension of RFID systems for the protocol proposed by Kinzel and Kanter , adding to the original protocol: a mutual authentication and the definition of frames. Through simulations it was possible to observe that the security level of the proposed protocol is a function only of the computational resources of the entities in the RFID system.
Keywords :
cryptographic protocols; radiofrequency identification; telecommunication security; RFID system; key management protocol; mutual authentication; neural cryptography; radio frequency identification; Authentication; Costs; Cryptographic protocols; Cryptography; Noise generators; Privacy; RFID tags; Radiofrequency identification; Security; Technology management;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Technology and Secured Transactions, 2009. ICITST 2009. International Conference for
Conference_Location :
London
Print_ISBN :
978-1-4244-5647-5
Type :
conf
DOI :
10.1109/ICITST.2009.5402512
Filename :
5402512
Link To Document :
بازگشت