15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed C 2014
DOI: 10.1109/snpd.2014.6888694
|View full text |Cite
|
Sign up to set email alerts
|

Security and privacy protocol for emerging smart RFID applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…In our previous works [1] [3], we already demonstrated that our solution is feasible to mitigate various security and privacy threats in smart RFID system.…”
Section: A Vulnerabilitiesmentioning
confidence: 84%
“…In our previous works [1] [3], we already demonstrated that our solution is feasible to mitigate various security and privacy threats in smart RFID system.…”
Section: A Vulnerabilitiesmentioning
confidence: 84%
“…Smart RFID system introduces tremendous problem in security and privacy ranging from the vulnerabilities that arise from the nature of wireless communications, the threats arising from the vulnerable nature of Wireless Sensor Networks (WSN), to the vulnerabilities derived from the use of RFID technic itself. In our previous works [1] [3], we already demonstrated that our solution is feasible to mitigate various security and privacy threats in smart RFID system. In this paper we particularly focus on the threats derived from key management scheme in the constrained nature of smart RFID, which are listed as follow.…”
Section: Vulnerabilitiesmentioning
confidence: 84%
“…In this work, we proved that our protocol is suitable to mitigate various threats, as well as preserve the privacy in the constrained nature of Wireless Indoor Positioning (WIP) applications. In subsequent work [3], we proved that the protocol is also suitable to mitigate various security and privacy threats in the constrained nature of smart RFID system. We improved the performance of IMAKA-Tate by introducing RFID-Tate [1], which is tailored to the limited resources of active RFID tag over IEEE 802.15.4.…”
Section: Related Workmentioning
confidence: 89%
“…The factors that affect the data integrity in the transmission process are label collisions, that is, at the same time the reader receives the response from different labels, which will lead to the reader cannot identify any one label [7,8]. Therefore, it is necessary to study and deal with the identification of low-cost tags.…”
Section: Introductionmentioning
confidence: 99%