Proceedings of the 1st International Conference on Industrial Networks and Intelligent Systems 2015
DOI: 10.4108/icst.iniscom.2015.258316
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Key Management System for Large-scale Smart RFID Applications

Abstract: Due to low-cost and its practical solution, the integration of RFID tag to the sensor node called smart RFID has become prominent solution in various fields including industrial applications. Nevertheless, the constrained nature of smart RFID system introduces tremendous security and privacy problem. One of them is the problem in key management system. Indeed, it is not feasible to recall all RFID tags in order to update their security properties (e.g. update their private keys). On the other hand, using commo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…The following were examples of organizational policy rules [1], [2]. Prevention with authentication techniques and access control could be seen from examples [3]- [9]. Then, monitoring and detection could be adopted through methods [10]- [21].…”
Section: B Related Researchmentioning
confidence: 99%
“…The following were examples of organizational policy rules [1], [2]. Prevention with authentication techniques and access control could be seen from examples [3]- [9]. Then, monitoring and detection could be adopted through methods [10]- [21].…”
Section: B Related Researchmentioning
confidence: 99%
“…A security system in general can be implemented through three stages, namely organizational policy rules, prevention with authentication and access control techniques, monitoring and detection. This study cited some examples of organizational policy rules from Mohammad [1] and Sadikin [2], and several examples of prevention with authentication techniques and access control from Sadikin and Mkyas [3]- [9]. The monitoring and detection was adopted from the previous research [10]- [21].…”
Section: B Related Researchmentioning
confidence: 99%
“…Following are examples of organizational policy regulations [1], [2]. Examples [3]- [9] illustrate the use of authentication and access control techniques for prevention purposes. The monitoring and detection methods [10]- [21] can then be utilized.…”
Section: B Relevant Studiesmentioning
confidence: 99%