원문정보
보안공학연구지원센터(IJFGCN)
International Journal of Future Generation Communication and Networking
Vol.6 No.4
2013.08
pp.49-60
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
When RFID systems become pervasive in our life, tag search becomes crucial. However, the problem of RFID search has not been widely addressed in the literature. RFID search protocol which is used to find specific tags has many applications such as inventory management, supply chain management. In this paper, we propose a set of secure and private Hash-based RFID search protocols that can meet all known major attacks in RFID systems, and especially it can protect the privacy of mobile reader users.
목차
Abstract
1. Introduction
2. A RFID search protocol based on static ID scheme
2.1. Notation
2.2. Assumptions
2.3. The (i +1)th Authentication Access
2.4. The Corresponding Search Protocol of this Authentication Protocol
2.5. Security Analysis of this Search Protocol
3. A RFID Search Protocol based on Dynamic ID Scheme for Fixed Reader
3.1. Notation
3.2 The (i +1)th authentication access
3.3. The Corresponding Search Protocol of this Authentication Protocol
3.4. Security Analysis of this Search Protocol
4. A RFID Search Protocol based on Dynamic ID Scheme for Mobile Reader
4.1. Assumptions
4.2. The Execution Access of the Proposed Search Protocol
4.3. Security Analysis of this Search Protocol
5. Conclusion
Acknowledgements
References
1. Introduction
2. A RFID search protocol based on static ID scheme
2.1. Notation
2.2. Assumptions
2.3. The (i +1)th Authentication Access
2.4. The Corresponding Search Protocol of this Authentication Protocol
2.5. Security Analysis of this Search Protocol
3. A RFID Search Protocol based on Dynamic ID Scheme for Fixed Reader
3.1. Notation
3.2 The (i +1)th authentication access
3.3. The Corresponding Search Protocol of this Authentication Protocol
3.4. Security Analysis of this Search Protocol
4. A RFID Search Protocol based on Dynamic ID Scheme for Mobile Reader
4.1. Assumptions
4.2. The Execution Access of the Proposed Search Protocol
4.3. Security Analysis of this Search Protocol
5. Conclusion
Acknowledgements
References
저자정보
참고문헌
자료제공 : 네이버학술정보