Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security 2007
DOI: 10.1145/1229285.1229318
|View full text |Cite
|
Sign up to set email alerts
|

Protecting RFID communications in supply chains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
74
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 76 publications
(74 citation statements)
references
References 14 publications
0
74
0
Order By: Relevance
“…Other than key distribution, our RSS construction provides more desired security properties such as anti-cloning than the JPP mechanism. The advantages of secret sharing approaches can be clearly demonstrated by comparing with existing RFID authentication protocols [9,8,6]. These authentication protocols are designed to have different security and efficiency features with a common assumption that shared keys must exist between mutually trusted parties, and that the tag keys are stored in a central database.…”
Section: Analysis and Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…Other than key distribution, our RSS construction provides more desired security properties such as anti-cloning than the JPP mechanism. The advantages of secret sharing approaches can be clearly demonstrated by comparing with existing RFID authentication protocols [9,8,6]. These authentication protocols are designed to have different security and efficiency features with a common assumption that shared keys must exist between mutually trusted parties, and that the tag keys are stored in a central database.…”
Section: Analysis and Comparisonmentioning
confidence: 99%
“…For dynamic RFID-enabled supply chains, the parties in a supply chain are usually lack of pre-existing trusted relationships. Unfortunately, almost all existing RFID privacy-enhanced authentication protocols such as [9,8,6], assuming a central database on managing all secret keys of the tags, may fail on delivering key information to the correct parties when a large scale of RFID tags move along dynamic supply chains.…”
Section: Introductionmentioning
confidence: 99%
“…Our protocols are added to that table. Yingjiu [29] proposed a protocol that is applied on a supply chain system. In that protocol they used a hash function on the tag.…”
Section: Performance Analysis For Protocolmentioning
confidence: 99%
“…Many protocols such as [23,29] have been designed to provide mutual authentication or tag authentication in RFID systems. These protocols can be used to prevent counterfeiting in supply chains.…”
Section: Introductionmentioning
confidence: 99%