Smart RFID reader protocol for malware detection

Ray, B., Huda, Shamsul and Chowdhury, Morshed U. 2011, Smart RFID reader protocol for malware detection, in SNPD 2011 : Proceedings of the 12th ACIS International Conference on Software Engineering, Artificial Intelligence Networking and Parallel Distributed Computing, IEEE, Piscataway, N. J., pp. 64-69.

Attached Files
Name Description MIMEType Size Downloads

Title Smart RFID reader protocol for malware detection
Author(s) Ray, B.
Huda, Shamsul
Chowdhury, Morshed U.
Conference name ACIS International Conference on Software Engineering, Artificial Intelligence Networking and Parallel Distributed Computing (12th : 2011 : Sydney, N. S. W.)
Conference location Sydney, N. S. W.
Conference dates 6-8 July 2011
Title of proceedings SNPD 2011 : Proceedings of the 12th ACIS International Conference on Software Engineering, Artificial Intelligence Networking and Parallel Distributed Computing
Editor(s) [Unknown]
Publication date 2011
Conference series ACIS International Conference on Software Engineering, Artificial Intelligence Networking and Parallel Distributed Computing
Start page 64
End page 69
Total pages 6
Publisher IEEE
Place of publication Piscataway, N. J.
Keyword(s) infected tag
radio frequency identification
sanitization technique
Summary Radio frequency identification (RFID) is a remote identification technique promises to revolutionize the way a specific object use to identify in our industry. However, large scale implementation of RFID sought for protection, against Malware threat, information privacy and un-traceability, for low cost RFID tag. In this paper, we propose a framework to provide privacy for tag data and to provide protection for RFID system from malware. In the proposed framework, malware infected tag is detected by analysing individual component of the RFID tag. It uses sanitization technique for analysing individual component. Here authentication based shared unique parameters is used as a method to protect privacy. This authentication protocol will be capable of handling forward and backward security and identifying rogue reader better than existing protocols. Using this framework, the RFID system will be protected from malware and the privacy of the tag will be ensured as well.
ISBN 1457708965
9781457708961
Language eng
Field of Research 080503 Networking and Communications
Socio Economic Objective 890205 Information Processing Services (incl. Data Entry and Capture)
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2011, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30042210

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 71 Abstract Views, 6 File Downloads  -  Detailed Statistics
Created: Tue, 14 Feb 2012, 15:17:23 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.