Mutual authentication with malware protection for a RFID system

Biplob, Ray, Chowdhury, Morshed U. and Pham, Thao 2010, Mutual authentication with malware protection for a RFID system, in ITS 2010 : Proceedings of the Annual International Conference on Information Technology Security, Global Science & Technology Forum (GSTF), Singapore, pp. 24-29.

Attached Files
Name Description MIMEType Size Downloads

Title Mutual authentication with malware protection for a RFID system
Author(s) Biplob, Ray
Chowdhury, Morshed U.ORCID iD for Chowdhury, Morshed U.
Pham, Thao
Conference name Annual International Conference on Information Technology Security (2010 : Phuket, Thailand)
Conference location Phuket, Thailand
Conference dates 29-30 Nov. 2010
Title of proceedings ITS 2010 : Proceedings of the Annual International Conference on Information Technology Security
Editor(s) Sajeev, A.S.M.
Publication date 2010
Conference series Information Technology Security International Conference
Start page 24
End page 29
Total pages 6
Publisher Global Science & Technology Forum (GSTF)
Place of publication Singapore
Keyword(s) RFID
rogue reader
reader protocol
Summary Radio Frequency Identification (RFID) system is a remote identification technology which is taking the place of barcodes to become electronic tags of an object. However, its radio transmission nature is making it vulnerable in terms of security. Recently, research proposed that an RFID tag can contain malicious code which might spread viruses, worms and other exploits to middleware and back-end systems. This paper is proposing a framework which will provide protection from malware and ensure the data privacy of a tag. The framework will use a sanitization technique with a mutual authentication in the reader level. This will ensure that any malicious code in the tag is identified. If the tag is infected by malicious code it will stop execution of the code in the RFIF system. Here shared unique parameters are used for authentication. It will be capable of protecting an RFID system from denial of service (DOS) attack, forward security and rogue reader better than existing protocols. The framework is introducing a layer concept on a smart reader to reduce coupling between different tasks. Using this framework, the RFID system will be protected from malware and also the privacy of the tag will be ensured.
Notes Awarded best research paper award
ISBN 9789810876548
Language eng
Field of Research 080303 Computer System Security
Socio Economic Objective 890206 Internet Hosting Services (incl. Application Hosting Services)
HERDC Research category E1 Full written paper - refereed
HERDC collection year 2010
Copyright notice ©2010, GSTF
Persistent URL

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 487 Abstract Views, 27 File Downloads  -  Detailed Statistics
Created: Wed, 11 May 2011, 11:25:34 EST by Sandra Dunoon

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact