YA-SRAP: yet another serverless RFID authentication protocol
YA-SRAP: yet another serverless RFID authentication protocol
- Author(s): S.I. Ahamed ; E. Hoque ; F. Rahman ; F. Kawsar ; T. Nakajima
- DOI: 10.1049/cp:20081141
For access to this article, please select a purchase option:
Buy conference paper PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
4th International Conference on Intelligent Environments (IE 08) — Recommend this title to your library
Thank you
Your recommendation has been sent to your librarian.
- Author(s): S.I. Ahamed ; E. Hoque ; F. Rahman ; F. Kawsar ; T. Nakajima Source: 4th International Conference on Intelligent Environments (IE 08), 2008 page ()
- Conference: 4th International Conference on Intelligent Environments (IE 08)
- DOI: 10.1049/cp:20081141
- ISBN: 978 0 86341 894 5
- Location: Seattle, WA, USA
- Conference date: 21-22 July 2008
- Format: PDF
Several security threats in RFID systems are obstacles to intermingle this technology into human lives. On the other hand ensuring flexible privacy mechanism has been a challenge due to extremely inadequate computational storage of typical RFID tags. So in order to relieve tags from responsibility, privacy protection and security assurance was guaranteed by central server. In this paper, we describe serverless, lightweight, forward secured and untraceable authentication protocol for RFID tags. This authentication protocol ensures security against almost all major attacks without the intervention of server. Furthermore it is very critical to guarantee untraceability and scalability simultaneously. Here we are proposing a scheme to make our protocols more scalable via ownership transfer. To the best of our knowledge this is incorporated in the serverless system for the first time. (8 pages)
Inspec keywords: radiofrequency identification; message authentication; data privacy; telecommunication security; cryptographic protocols
Subjects: Other radio links and systems; Protocols; Cryptography
Related content
content/conferences/10.1049/cp_20081141
pub_keyword,iet_inspecKeyword,pub_concept
6
6