Secure authentication and management scheme for RFID

  • Authors:
  • Dae-Hee Seo;Jang-Mi Baek;Dong-Sub Cho

  • Affiliations:
  • Ewha Womens University, Seoul, South Korea;SoonChunHyang University, ChungNam, South Korea;Ewha Womens University, Seoul, South Korea

  • Venue:
  • Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

This study, in particular, aims to regulate the core techniques of ubiquitous computing, such as the use of an ad hoc network and the smart-tag technique, and to look more closely into RFID's smart-tag-related security service. The study aims to do so because several important technical factors and structures must be taken into account for RFID to be applied in the ubiquitous computing-related infrastructure, and the security of the tag is considered one of the core technologies. To realize secure ubiquitous computing in the case of the passive-tag-performing RF communication, a less costly security service, the technical items needed to carry this out, a security service to be applied to passive tags, and network management techniques are required. Therefore, the passive/active-tag management technique based on a secure password-based system, with the RFID tag authentication system, is proposed in this study. This system performs a secure authentication process and provides an efficient and secure management system.