Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Choi, Eun Young | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.contributor.author | Lim, Jong In | - |
dc.date.accessioned | 2021-09-08T11:52:06Z | - |
dc.date.available | 2021-09-08T11:52:06Z | - |
dc.date.created | 2021-06-11 | - |
dc.date.issued | 2009-11 | - |
dc.identifier.issn | 0920-5489 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/118959 | - |
dc.description.abstract | Radio frequency Identification (RFID) systems are used to identify remote objects equipped with RFID tags by wireless scanning without manual intervention. Recently, EPCglobal proposed the Electronic Product Code (EPC) that is a coding scheme considered to be a possible successor to bar-code with added functionalities. In RFID-based applications where RFID tags are used to identify and track tagged objects, an RFID tag emits its EPC in plaintext. This makes the tag inevitably vulnerable to cloning attacks as well as information leakage and password disclosure. In this paper, we propose a novel anti-cloning method in accordance with the EPCglobal Class-1 Generation-2 (C1G2) standard. Our method only uses functions that can be supported by the standard and abides by the communication flow of the standard. The method is also secure against threats such as information leakage and password disclosure. (C) 2008 Elsevier B.V. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER | - |
dc.subject | SECURITY | - |
dc.title | Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.contributor.affiliatedAuthor | Lim, Jong In | - |
dc.identifier.doi | 10.1016/j.csi.2008.12.002 | - |
dc.identifier.scopusid | 2-s2.0-68949181328 | - |
dc.identifier.wosid | 000270626700010 | - |
dc.identifier.bibliographicCitation | COMPUTER STANDARDS & INTERFACES, v.31, no.6, pp.1124 - 1130 | - |
dc.relation.isPartOf | COMPUTER STANDARDS & INTERFACES | - |
dc.citation.title | COMPUTER STANDARDS & INTERFACES | - |
dc.citation.volume | 31 | - |
dc.citation.number | 6 | - |
dc.citation.startPage | 1124 | - |
dc.citation.endPage | 1130 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.subject.keywordPlus | SECURITY | - |
dc.subject.keywordAuthor | RFID system | - |
dc.subject.keywordAuthor | EPCglobal Class-1 Generation-2 | - |
dc.subject.keywordAuthor | Cloning attack | - |
dc.subject.keywordAuthor | Privacy | - |
dc.subject.keywordAuthor | Security | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.