Loading…

Trusted anonymizer-based RFID system with integrity verification

RFID technology is considered as an advanced identification system because it can communicate through wireless communication. However, the unprotected wireless communication channel opens up many possibilities of these tags being tracked by illegal reader which violates data privacy. Past works reve...

Full description

Saved in:
Bibliographic Details
Main Authors: Mubarak, M. F., Manan, J. A., Yahya, S.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 103
container_issue
container_start_page 98
container_title
container_volume
creator Mubarak, M. F.
Manan, J. A.
Yahya, S.
description RFID technology is considered as an advanced identification system because it can communicate through wireless communication. However, the unprotected wireless communication channel opens up many possibilities of these tags being tracked by illegal reader which violates data privacy. Past works revealed that RFID tags would be the easy target of attacks related to system security and data privacy. The more advanced RFID technology can embed its applications in hand-held devices such as NFC type of mobile phones and biometric devices. This would again become vulnerable to attacks on its RFID components. Past works on RFID with anonymizers have dealt with lots of issues regarding system integrity and availability. However, the corresponding solutions have focused solely on the RFID tag. In this paper, we propose a trusted anonymizer-based RFID system integrity verification with emphasis on using mutual attestation process to provide system integrity to the whole system including every other component within RFID system.
doi_str_mv 10.1109/ISIAS.2011.6122802
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6122802</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6122802</ieee_id><sourcerecordid>6122802</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-58b4f44aa9243e84141f0cb21f20b4c3af3aa923ede41857548add984cb917063</originalsourceid><addsrcrecordid>eNpVT8FKxDAUjIigrP0BvfQHWvOSlya5uazuWlgQ3N6XtE00YruSRKV-vRX34lyGmYEZhpAroCUA1Tf1rl7uSkYBygoYU5SdkExLBSikZCCEPP2nkZ6TLMZXOqOqNENxQW6b8BGT7XMzHsZp8N82FK2Js_G0ru_yOM3hkH_59JL7Mdnn4NOUf9rgne9M8ofxkpw58xZtduQFadb3zeqh2D5u6tVyW3hNUyFUiw7RmHmVW4WA4GjXMnCMtthx4_hvxm1vEZSQApXpe62wazVIWvEFuf6r9dba_XvwgwnT_nib_wC5s0tP</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Trusted anonymizer-based RFID system with integrity verification</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Mubarak, M. F. ; Manan, J. A. ; Yahya, S.</creator><creatorcontrib>Mubarak, M. F. ; Manan, J. A. ; Yahya, S.</creatorcontrib><description>RFID technology is considered as an advanced identification system because it can communicate through wireless communication. However, the unprotected wireless communication channel opens up many possibilities of these tags being tracked by illegal reader which violates data privacy. Past works revealed that RFID tags would be the easy target of attacks related to system security and data privacy. The more advanced RFID technology can embed its applications in hand-held devices such as NFC type of mobile phones and biometric devices. This would again become vulnerable to attacks on its RFID components. Past works on RFID with anonymizers have dealt with lots of issues regarding system integrity and availability. However, the corresponding solutions have focused solely on the RFID tag. In this paper, we propose a trusted anonymizer-based RFID system integrity verification with emphasis on using mutual attestation process to provide system integrity to the whole system including every other component within RFID system.</description><identifier>ISBN: 9781457721540</identifier><identifier>ISBN: 1457721546</identifier><identifier>EISBN: 9781457721557</identifier><identifier>EISBN: 9781457721533</identifier><identifier>EISBN: 1457721538</identifier><identifier>EISBN: 1457721554</identifier><identifier>DOI: 10.1109/ISIAS.2011.6122802</identifier><language>eng</language><publisher>IEEE</publisher><subject>Anonymizer ; Data privacy ; Encryption ; Privacy ; Protocols ; Radiofrequency identification ; RFID ; Security ; Servers ; System Trust ; TPM</subject><ispartof>2011 7th International Conference on Information Assurance and Security (IAS), 2011, p.98-103</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6122802$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6122802$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Mubarak, M. F.</creatorcontrib><creatorcontrib>Manan, J. A.</creatorcontrib><creatorcontrib>Yahya, S.</creatorcontrib><title>Trusted anonymizer-based RFID system with integrity verification</title><title>2011 7th International Conference on Information Assurance and Security (IAS)</title><addtitle>ISIAS</addtitle><description>RFID technology is considered as an advanced identification system because it can communicate through wireless communication. However, the unprotected wireless communication channel opens up many possibilities of these tags being tracked by illegal reader which violates data privacy. Past works revealed that RFID tags would be the easy target of attacks related to system security and data privacy. The more advanced RFID technology can embed its applications in hand-held devices such as NFC type of mobile phones and biometric devices. This would again become vulnerable to attacks on its RFID components. Past works on RFID with anonymizers have dealt with lots of issues regarding system integrity and availability. However, the corresponding solutions have focused solely on the RFID tag. In this paper, we propose a trusted anonymizer-based RFID system integrity verification with emphasis on using mutual attestation process to provide system integrity to the whole system including every other component within RFID system.</description><subject>Anonymizer</subject><subject>Data privacy</subject><subject>Encryption</subject><subject>Privacy</subject><subject>Protocols</subject><subject>Radiofrequency identification</subject><subject>RFID</subject><subject>Security</subject><subject>Servers</subject><subject>System Trust</subject><subject>TPM</subject><isbn>9781457721540</isbn><isbn>1457721546</isbn><isbn>9781457721557</isbn><isbn>9781457721533</isbn><isbn>1457721538</isbn><isbn>1457721554</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNpVT8FKxDAUjIigrP0BvfQHWvOSlya5uazuWlgQ3N6XtE00YruSRKV-vRX34lyGmYEZhpAroCUA1Tf1rl7uSkYBygoYU5SdkExLBSikZCCEPP2nkZ6TLMZXOqOqNENxQW6b8BGT7XMzHsZp8N82FK2Js_G0ru_yOM3hkH_59JL7Mdnn4NOUf9rgne9M8ofxkpw58xZtduQFadb3zeqh2D5u6tVyW3hNUyFUiw7RmHmVW4WA4GjXMnCMtthx4_hvxm1vEZSQApXpe62wazVIWvEFuf6r9dba_XvwgwnT_nib_wC5s0tP</recordid><startdate>201112</startdate><enddate>201112</enddate><creator>Mubarak, M. F.</creator><creator>Manan, J. A.</creator><creator>Yahya, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201112</creationdate><title>Trusted anonymizer-based RFID system with integrity verification</title><author>Mubarak, M. F. ; Manan, J. A. ; Yahya, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-58b4f44aa9243e84141f0cb21f20b4c3af3aa923ede41857548add984cb917063</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Anonymizer</topic><topic>Data privacy</topic><topic>Encryption</topic><topic>Privacy</topic><topic>Protocols</topic><topic>Radiofrequency identification</topic><topic>RFID</topic><topic>Security</topic><topic>Servers</topic><topic>System Trust</topic><topic>TPM</topic><toplevel>online_resources</toplevel><creatorcontrib>Mubarak, M. F.</creatorcontrib><creatorcontrib>Manan, J. A.</creatorcontrib><creatorcontrib>Yahya, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Mubarak, M. F.</au><au>Manan, J. A.</au><au>Yahya, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Trusted anonymizer-based RFID system with integrity verification</atitle><btitle>2011 7th International Conference on Information Assurance and Security (IAS)</btitle><stitle>ISIAS</stitle><date>2011-12</date><risdate>2011</risdate><spage>98</spage><epage>103</epage><pages>98-103</pages><isbn>9781457721540</isbn><isbn>1457721546</isbn><eisbn>9781457721557</eisbn><eisbn>9781457721533</eisbn><eisbn>1457721538</eisbn><eisbn>1457721554</eisbn><abstract>RFID technology is considered as an advanced identification system because it can communicate through wireless communication. However, the unprotected wireless communication channel opens up many possibilities of these tags being tracked by illegal reader which violates data privacy. Past works revealed that RFID tags would be the easy target of attacks related to system security and data privacy. The more advanced RFID technology can embed its applications in hand-held devices such as NFC type of mobile phones and biometric devices. This would again become vulnerable to attacks on its RFID components. Past works on RFID with anonymizers have dealt with lots of issues regarding system integrity and availability. However, the corresponding solutions have focused solely on the RFID tag. In this paper, we propose a trusted anonymizer-based RFID system integrity verification with emphasis on using mutual attestation process to provide system integrity to the whole system including every other component within RFID system.</abstract><pub>IEEE</pub><doi>10.1109/ISIAS.2011.6122802</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781457721540
ispartof 2011 7th International Conference on Information Assurance and Security (IAS), 2011, p.98-103
issn
language eng
recordid cdi_ieee_primary_6122802
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Anonymizer
Data privacy
Encryption
Privacy
Protocols
Radiofrequency identification
RFID
Security
Servers
System Trust
TPM
title Trusted anonymizer-based RFID system with integrity verification
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T18%3A49%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Trusted%20anonymizer-based%20RFID%20system%20with%20integrity%20verification&rft.btitle=2011%207th%20International%20Conference%20on%20Information%20Assurance%20and%20Security%20(IAS)&rft.au=Mubarak,%20M.%20F.&rft.date=2011-12&rft.spage=98&rft.epage=103&rft.pages=98-103&rft.isbn=9781457721540&rft.isbn_list=1457721546&rft_id=info:doi/10.1109/ISIAS.2011.6122802&rft.eisbn=9781457721557&rft.eisbn_list=9781457721533&rft.eisbn_list=1457721538&rft.eisbn_list=1457721554&rft_dat=%3Cieee_6IE%3E6122802%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-58b4f44aa9243e84141f0cb21f20b4c3af3aa923ede41857548add984cb917063%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6122802&rfr_iscdi=true