View : 567 Download: 0
Secure authentication and management scheme for RFID
- Title
- Secure authentication and management scheme for RFID
- Authors
- Seo D.-H.; Baek J.-M.; Cho D.-S.
- Ewha Authors
- 조동섭; 서대희
- SCOPUS Author ID
- 조동섭
- Issue Date
- 2008
- Journal Title
- Q2SWinet'08: Proceedings of the 4th ACM International Symposium on QoS and Security for Wireless and Mobile Networks
- Citation
- Q2SWinet'08: Proceedings of the 4th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, pp. 106 - 110
- Indexed
- SCOPUS
- Document Type
- Conference Paper
- Abstract
- This study, in particular, aims to regulate the core techniques of ubiquitous computing, such as the use of an ad hoc network and the smart-tag technique, and to look more closely into RFID's smart-tag-related security service. The study aims to do so because several important technical factors and structures must be taken into account for RFID to be applied in the ubiquitous computing-related infrastructure, and the security of the tag is considered one of the core technologies. To realize secure ubiquitous computing in the case of the passive-tag-performing RF communication, a less costly security service, the technical items needed to carry this out, a security service to be applied to passive tags, and network management techniques are required. Therefore, the passive/active-tag management technique based on a secure password-based system, with the RFID tag authentication system, is proposed in this study. This system performs a secure authentication process and provides an efficient and secure management system. © 2008 ACM.
- DOI
- 10.1145/1454586.1454605
- ISBN
- 9781605582375
- Appears in Collections:
- 인공지능대학 > 컴퓨터공학과 > Journal papers
- Files in This Item:
There are no files associated with this item.
- Export
- RIS (EndNote)
- XLS (Excel)
- XML