Lend me your arms: The use and implications of humancentric RFID
Electronic Commerce Research and Applications
Proceedings of the 2007 ACM symposium on Applied computing
Hash Functions and RFID Tags: Mind the Gap
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
A design automation and power estimation flow for RFID systems
ACM Transactions on Design Automation of Electronic Systems (TODAES)
Engineering Applications of Artificial Intelligence
Security risk analysis of RFID technology: a RFID tag life cycle approach
WTS'09 Proceedings of the 2009 conference on Wireless Telecommunications Symposium
Mutual authentication scheme for EPC tags- readers in the supply chain
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
RFID usage issues in the supply chain
WTS'10 Proceedings of the 9th conference on Wireless telecommunications symposium
Multiple zones surveillance system using RFID
WSEAS TRANSACTIONS on SYSTEMS
Deriving industrial logistics hub reference models for manufacturing based economies
Expert Systems with Applications: An International Journal
Low frequency passive RFID transponder with non-revivable privacy protection circuit
IMCAS'06 Proceedings of the 5th WSEAS international conference on Instrumentation, measurement, circuits and systems
MARP: mobile agent for RFID privacy protection
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Tamper detection for ubiquitous RFID-Enabled supply chain
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
The development of reliability verification tool of RFID tag for effective product control systems
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
A minimum disclosure approach to authentication and privacy in RFID systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Design of Tamper Resistant Prescription RFID Access Control System
Journal of Medical Systems
Context-aware web services for security control and privacy preservation in an RFID supply chain
International Journal of Information Technology and Management
Hi-index | 0.00 |
Radio Frequency Identification (RFID) is expected to become pervasive and ubiquitous, as it can be embedded into everyday items as smart labels. A typical scenario of exploiting RFID is supply chain. The RFID based supply chain management yields convenience, efficiency and productivity gains. However, RFID systems create new risks to security and privacy. This paper briefly presents the current solutions to RFID security and privacy. A new approach is then proposed, which exploits randomized read access control and thus prevents hostile tracking and man-in-the-middle attack. In addition, compared with current schemes that achieve the similar security level, the proposed approach dramatically decreases the computation load. Another benefit is that it is suitable for RFID systems with a large number of tags.