2012 IEEE Conference on Technologies for Homeland Security (HST) 2012
DOI: 10.1109/ths.2012.6459844
|View full text |Cite
|
Sign up to set email alerts
|

Group authentication in heterogeneous RFID networks

Abstract: The proliferation of RFID tags means that an RFID reader will often interact with large groups of RFID tags. However, the majority of RFID security research is still focused on securing single reader-single tag interaction, which is unlikely to be scalable to larger groups of tags. In this paper, we propose a protocol that allows a large group of tags to authenticate a reader. Our technique relies on using a more powerful RFID tag, known as a computational RFID tag (CRFID), which is included into the large gro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…Recently, some works emerged dealing with multiple tags' identification and thus are related to this work [25][26][27][28]. Yang et al [25] propose to aggregate the responses from a batch of tags on corresponding readers, and then the aggregated responses enable probabilistic verification for the batch of tags.…”
Section: Existing Ppa Protocols and Their Limitationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, some works emerged dealing with multiple tags' identification and thus are related to this work [25][26][27][28]. Yang et al [25] propose to aggregate the responses from a batch of tags on corresponding readers, and then the aggregated responses enable probabilistic verification for the batch of tags.…”
Section: Existing Ppa Protocols and Their Limitationsmentioning
confidence: 99%
“…However, this work focuses on tag identification other than authentication. Sheng and Tan [28] study the group authentication problem with heterogeneous RFID network. In this work, more advanced computational RFID tags are introduced helping regular tags to be authenticated to the reader.…”
Section: Related Workmentioning
confidence: 99%
“…The use of RFID technology becomes increasingly exploited in stock management [3], it allows the acceleration and simplification of the inventory process, (annual inventory, perpetual inventory, rolling inventory, auditing…), it also anticipates any warehouse articles out of stock. This technology also provides us with a better tracking, different pathing for each product owned by each firm during shipment from one firm to another.…”
Section: Introductionmentioning
confidence: 99%
“…Then, the generated data is delivered to the RFID part and tags transmit it by backscattering the signal of the reader. With this computational capability, potential applicability of CRFID can be widened with sufficiently low energy consumption [5]. In this sense, CRFID is treated as a viable solution of enabling IoT networks [6].…”
Section: Introductionmentioning
confidence: 99%