Low-Cost RFID Identification Variation
Access Status
Authors
Date
2006Type
Metadata
Show full item recordCitation
Source Title
Source Conference
Additional URLs
ISSN
Collection
Abstract
Interests continue to grow in recent years for the adoption of Radio Frequency Identification (RFID) in many different areas including transportation and supply chain management. Those RFID-included objects can be targeted more efficiently by real-time tracking and instant management. However, because of the contact-less type of RFID remote retrieval, the transmission of data in the air is very vulnerable to eavesdropping or appropriation. A primary security concern surrounding RFID technology is the illicit tracking of consumer location and analyzing of their shopping habits or behavior. This paper proposes a more secure and lightweight RFID variation protection protocol which enhances the security of the transmission of information as well as the consumer privacy protection by using randomized control access and two-way identification. In addition, this protocol also improves the overall performance and lowers the cost of RFID tag without any complicated calculation.
Related items
Showing items related by title, author, creator and subject.
-
Han, Song; Dillon, Tharam S.; Potdar, Vidyasagar; Chang, Elizabeth (2013)RFID has very huge potential in today's social and business developments. RFID-based identification is an example of emerging technology which requires authentication Security and Privacy are one of the important issues ...
-
Potdar, Vidyasagar; Wu, Chen; Chang, Elizabeth (2007)In this chapter we provide an introduction to RFID technology. We discuss the main components of the RFID technology, which includes RFID transponders, RFID readers, RFID middleware, and RFID labels. A detailed classification ...
-
Han, Song; Dillon, Tharam S.; Chang, Elizabeth (2007)Abstract. RFID, as an emerging technology, has very huge potential in today's social and business developments. Security and Privacy are one of the important issues in the design of practical RFID protocols. In this paper, ...