File(s) under permanent embargo
PUF-based secure checker protocol for Networked RFID Systems
conference contribution
posted on 2014-10-28, 00:00 authored by Biplob Ray, Morshed ChowdhuryMorshed Chowdhury, Jemal AbawajyJemal AbawajyRadio Frequency Identification (RFID) system is an
emerging technology for automating object identification. The
Networked RFID System (NRS) is a component of a distributed
object identification network which facilitates automated supply
chain management. It also makes the Internet of Things (IoT)
concept a reality. To increase the business feasibility of NRS
implementation, the system should be able to ensure the visibility
and traceability of the object throughout the chain using a
checker protocol. By doing so, the protocol will check the
genuineness of the object and the genuineness of the object’s
previous travel path on-site. While doing so, the protocol needs to
ensure the security requirement of the system. To this end, we
propose a secure checker protocol for NRS which will use a PUF
(Physically Unclonable Function) and simple cryptographic
primitives. The protocol provides security (protect privacy of the
partners, injection of fake objects, non-repudiation, and
unclonability), visibility and traceability for NRS. It is also
suitable for passive tags.
emerging technology for automating object identification. The
Networked RFID System (NRS) is a component of a distributed
object identification network which facilitates automated supply
chain management. It also makes the Internet of Things (IoT)
concept a reality. To increase the business feasibility of NRS
implementation, the system should be able to ensure the visibility
and traceability of the object throughout the chain using a
checker protocol. By doing so, the protocol will check the
genuineness of the object and the genuineness of the object’s
previous travel path on-site. While doing so, the protocol needs to
ensure the security requirement of the system. To this end, we
propose a secure checker protocol for NRS which will use a PUF
(Physically Unclonable Function) and simple cryptographic
primitives. The protocol provides security (protect privacy of the
partners, injection of fake objects, non-repudiation, and
unclonability), visibility and traceability for NRS. It is also
suitable for passive tags.
History
Event
IEEE Conference on Open Systems. Conference (2014 : Subang Jaya, Malaysia)Pagination
78 - 83Publisher
IEEELocation
Subang Jaya, MalaysiaPlace of publication
Piscataway, NJPublisher DOI
Start date
2014-10-26End date
2014-10-28ISBN-13
9781479963676Language
engPublication classification
E Conference publication; E1 Full written paper - refereedCopyright notice
2014, IEEEEditor/Contributor(s)
Y FakhrulHazmanTitle of proceedings
ICOS 2014: Proceedings on the 2014 IEEE Conference on Open SystemsUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorks
BibTeX
Ref. manager
Endnote
DataCite
NLM
DC