Security of RFID systems - a hybrid approach

Mukherjee, Subhasis, Hasan, Maynul, Chowdhury, Bilal and Chowdhury, Morshed 2011, Security of RFID systems - a hybrid approach, in SNPD 2011 : Proceedings of the 12th ACIS International Conference on Software Engineering, Artificial Intelligence Networking and Parallel Distributed Computing, IEEE, Piscataway, N. J., pp. 58-63.

Attached Files
Name Description MIMEType Size Downloads

Title Security of RFID systems - a hybrid approach
Author(s) Mukherjee, Subhasis
Hasan, Maynul
Chowdhury, Bilal
Chowdhury, Morshed
Conference name ACIS International Conference on Software Engineering, Artificial Intelligence Networking and Parallel Distributed Computing (12th : 2011 : Sydney, N. S. W.)
Conference location Sydney, N. S. W.
Conference dates 6-8 July 2011
Title of proceedings SNPD 2011 : Proceedings of the 12th ACIS International Conference on Software Engineering, Artificial Intelligence Networking and Parallel Distributed Computing
Editor(s) [Unknown]
Publication date 2011
Conference series ACIS International Conference on Software Engineering, Artificial Intelligence Networking and Parallel Distributed Computing
Start page 58
End page 63
Total pages 6
Publisher IEEE
Place of publication Piscataway, N. J.
Keyword(s) IV
RFID
RSA
SCM
WEP
Summary The use of RFID (Radio Frequency Identification) technology can be employed for tracking and detecting each container, pallet, case, and product uniquely in the supply chain. It connects the supply chain stakeholders (i.e.; suppliers, manufacturers, wholesalers/distributors, retailers and customers) and allows them to exchange data and product information. Despite these potential benefits, security issues are the key factor in the deployment of a RFID-enabled system in the global supply chain. This paper proposes a hybrid approach to secure RFID transmission in Supply Chain Management (SCM) systems using modified Wired Equivalent Encryption (WEP) and Rivest, Shamir and Adleman (RSA) cryptosystem. The proposed system also addresses the common loop hole of WEP key algorithm and makes it more secure compare to the existing modified WEP key process.
ISBN 1457708965
9781457708961
Language eng
Field of Research 080503 Networking and Communications
Socio Economic Objective 890299 Computer Software and Services not elsewhere classified
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2011, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30042209

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 69 Abstract Views, 8 File Downloads  -  Detailed Statistics
Created: Tue, 14 Feb 2012, 15:17:16 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.