You are not logged in.

PUF-based secure checker protocol for Networked RFID Systems

Ray,B, Chowdhury,M and Abawajy,J 2014, PUF-based secure checker protocol for Networked RFID Systems, in ICOS 2014: Proceedings on the 2014 IEEE Conference on Open Systems, IEEE, Piscataway, NJ, pp. 78-83, doi: 10.1109/ICOS.2014.7042633.

Attached Files
Name Description MIMEType Size Downloads

Title PUF-based secure checker protocol for Networked RFID Systems
Author(s) Ray,B
Chowdhury,MORCID iD for Chowdhury,M orcid.org/0000-0002-2866-4955
Abawajy,J
Conference name IEEE Conference on Open Systems. Conference (2014 : Subang Jaya, Malaysia)
Conference location Subang Jaya, Malaysia
Conference dates 2014/10/26 - 2014/10/28
Title of proceedings ICOS 2014: Proceedings on the 2014 IEEE Conference on Open Systems
Editor(s) Fakhrul Hazman,Y
Publication date 2014
Conference series IEEE Conference on Open Systems Conference
Start page 78
End page 83
Total pages 6
Publisher IEEE
Place of publication Piscataway, NJ
Keyword(s) PUF
unclonable
checker
protocol
NRS
RFID
privacy
injection of fake objects
non-repudiation
Summary Radio Frequency Identification (RFID) system is anemerging technology for automating object identification. TheNetworked RFID System (NRS) is a component of a distributedobject identification network which facilitates automated supplychain management. It also makes the Internet of Things (IoT)concept a reality. To increase the business feasibility of NRSimplementation, the system should be able to ensure the visibilityand traceability of the object throughout the chain using achecker protocol. By doing so, the protocol will check thegenuineness of the object and the genuineness of the object’sprevious travel path on-site. While doing so, the protocol needs toensure the security requirement of the system. To this end, wepropose a secure checker protocol for NRS which will use a PUF(Physically Unclonable Function) and simple cryptographicprimitives. The protocol provides security (protect privacy of thepartners, injection of fake objects, non-repudiation, andunclonability), visibility and traceability for NRS. It is alsosuitable for passive tags.
ISBN 9781479963676
Language eng
DOI 10.1109/ICOS.2014.7042633
Field of Research 080501 Distributed and Grid Systems
Socio Economic Objective 890104 Mobile Telephone Networks and Services
HERDC Research category E1 Full written paper - refereed
ERA Research output type E Conference publication
Copyright notice ©2014, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30071626

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 1 times in TR Web of Science
Scopus Citation Count Cited 1 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 172 Abstract Views, 3 File Downloads  -  Detailed Statistics
Created: Thu, 07 May 2015, 16:11:15 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.