Experimental analysis of an RFID security protocol

Zongwei Luo*, Terry Chan, Jenny S. Li, Edward Wong, Kwok Wai CHEUNG, Victor Ng, Wilton Fok

*Corresponding author for this work

Research output: Chapter in book/report/conference proceedingConference contributionpeer-review

5 Citations (Scopus)

Abstract

Radio frequency identification (RFID) technology is expected to become a critical and ubiquitous infrastructure technology of logistics and supply chain management (SCM) related processes and services. Low-cost has been the key to RFID adoption in many logistics/SCM applications. However, the deployment of such tags may create new threats to user privacy due to the powerful track and trace capabilities of the tags, in addition to tag/reader manufacturing challenges. As a result, some security mechanisms must be imposed on the RFID tags for addressing the privacy problems. This paper provides detailed discussion on our proposal of a lightweight RFID security protocol. It examines the features and issues through experimental analysis pertinent to efficiency and scalability to meet the requirements of the proposed security protocol in metering and payment e-commerce applications.

Original languageEnglish
Title of host publicationProceedings - IEEE International Conference on e-Business Engineering, ICEBE 2006
Pages62-69
Number of pages8
DOIs
Publication statusPublished - 2006
EventIEEE International Conference on e-Business Engineering, ICEBE 2006 - Shanghai, China
Duration: 24 Oct 200626 Oct 2006

Publication series

NameProceedings - IEEE International Conference on e-Business Engineering, ICEBE 2006

Conference

ConferenceIEEE International Conference on e-Business Engineering, ICEBE 2006
Country/TerritoryChina
CityShanghai
Period24/10/0626/10/06

Scopus Subject Areas

  • Computer Science(all)

User-Defined Keywords

  • RFID applications
  • Sensor systems
  • System security

Fingerprint

Dive into the research topics of 'Experimental analysis of an RFID security protocol'. Together they form a unique fingerprint.

Cite this