DocumentCode
2229307
Title
Severless Search and Authentication Protocols for RFID
Author
Tan, Chiu C. ; Sheng, Bo ; Li, Qun
Author_Institution
Dept. of Comput. Sci., William & Mary Coll., Williamsburg, VA
fYear
2007
fDate
19-23 March 2007
Firstpage
3
Lastpage
12
Abstract
With the increasing popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection to users. Most recent RFID protocols use a central database to store the RFID tag data. An RFID reader first queries the RFID tag and returns the reply to the database. After authentication, the database returns the tag data to the reader. In this paper, we proposed a more flexible authentication protocol that provides comparable protection without the need for a central database. We also suggest a protocol for secure search for RFID tags. We believe that as RFID applications become widespread, the ability to search for RFID tags will be increasingly useful
Keywords
data privacy; protocols; radiofrequency identification; telecommunication security; RFID tag data; central database; privacy protection; search-authentication protocols; Access protocols; Authentication; Computer science; Data security; Databases; Educational institutions; Privacy; Protection; RFID tags; Radiofrequency identification;
fLanguage
English
Publisher
ieee
Conference_Titel
Pervasive Computing and Communications, 2007. PerCom '07. Fifth Annual IEEE International Conference on
Conference_Location
White Plains, NY
Print_ISBN
0-7695-2787-6
Type
conf
DOI
10.1109/PERCOM.2007.30
Filename
4144745
Link To Document