IEEE International Conference on E-Commerce Technology for Dynamic E-Business
DOI: 10.1109/cec-east.2004.14
|View full text |Cite
|
Sign up to set email alerts
|

An approach to security and privacy of RFID system for supply chain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 58 publications
(10 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…(1) RFID doesn't require line-of-sight access to read. (2) The reading range of RFID is larger than that of bar code.…”
Section: Introductionmentioning
confidence: 98%
See 1 more Smart Citation
“…(1) RFID doesn't require line-of-sight access to read. (2) The reading range of RFID is larger than that of bar code.…”
Section: Introductionmentioning
confidence: 98%
“…As expected from beneficial features discussed above, it is believed that it is inevitable to substitute RFID tags for code bar. RFID-based retail supply chain system brings forth convenience, efficiency and productivity gains [2].…”
Section: Introductionmentioning
confidence: 99%
“…This scheme ensures privacy and protection against tracking attacks but does not offer forward security. In [14], Gao et al suggested a scheme based on the ability of each tag to authenticate the legitimacy of the reader that is communicating with. This scheme offers limited protection against tracking attacks and database desynchronisation attacks, does not offer forward security and is vulnerable to replay attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Our protocol utilizes a hash function, like many published protocols for low-cost RFID systems [2,9,10,11,12,14], that can be hardware implemented and incorporated in a low-cost RFID tag and a pseudorandom number generator [2]. An implementation of a 64 bit low-cost hash function is presented in [3] with only 1,7K gates.…”
Section: A Threats Against Low-cost Rfid Systemsmentioning
confidence: 99%
“…RFID mainly achieves to identify objectives automatically with the coupling between the radio-frequency signals and the space [3] . Generally, there are two parts to consist of RFID system, the electronic tag and the reader.…”
Section: Rfid and Its Basic Principlementioning
confidence: 99%