Secure and privacy-preserving protocols for RFID applicationsRFID 응용을 위한 프라이버시 보호 및 보안 프로토콜

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 440
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKim, Kwang-Jo-
dc.contributor.advisor김광조-
dc.contributor.authorKonidala, Divyan Munirathnam-
dc.contributor.author코니달라, 디비안 무니라트남-
dc.date.accessioned2011-12-14T02:25:59Z-
dc.date.available2011-12-14T02:25:59Z-
dc.date.issued2011-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=466489&flag=dissertation-
dc.identifier.urihttp://hdl.handle.net/10203/39879-
dc.description학위논문(박사) - 한국과학기술원 : 정보통신공학과, 2011.2, [ x, 117 p. ]-
dc.description.abstractRadio Frequency Identification (RFID) is a means to efficiently and quickly, auto-identify objects, assets, pets, people, etc. RFID technology is poised to automate the supply chain management system for businesses. Very soon it would become economical to attach RFID tags to items and consumer goods. As a result we can anticipate many electronic appliances including mobile/smart phones to have a RFID-reader-tag component/chip embedded in them. Such developments would allow RFID technology to also assist people in their daily lives. In this thesis we focus on three specific RFID applications that are beneficial to businesses and consumers. At the outset this thesis focuses on RFID-based supply chain management system that adheres to the standard EPCglobal Architecture Framework specification. We approach this framework with a security point-of-view. We analyzed the various security threats that affect each of the framework’s entities and their communication interfaces. We arrive at some possible security requirements and needed security solutions to ward off these threats. After our thorough security assessment of the RFID-based supply chain management system, we narrowed down our research focus on RFID: Tag-Reader-Server security. We realized that cloned fake RFID tags, malicious RFID readers and consumer privacy violation pose a major threat to RFID-based supply chain management system. Since these low-cost passive tags have constrained resources, in this thesis we propose two innovative light-weight cryptographic protocols which use only light-weight primitives such as 16 bit: random number generator, cyclic redundancy check and exclusive-OR (XOR) functions and provide RFID tag-reader-Server mutual authentication, communicating-data confidentiality and integrity, secure key-distribution and key-protection, and tag anonymity. The promising and beneficial RFID technology would eventually lead to the development and deployment of electronic appliances and devi...eng
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectRFID Applications-
dc.subjectMobile RFID Payment-
dc.subjectRFID Privacy-
dc.subjectRFID Security-
dc.subjectAuthentication-
dc.subject인증-
dc.subjectRFID 응용-
dc.subject모바일 RFID 지불-
dc.subjectRFID 프라이버시-
dc.subjectRFID 보안-
dc.titleSecure and privacy-preserving protocols for RFID applications-
dc.title.alternativeRFID 응용을 위한 프라이버시 보호 및 보안 프로토콜-
dc.typeThesis(Ph.D)-
dc.identifier.CNRN466489/325007 -
dc.description.department한국과학기술원 : 정보통신공학과, -
dc.identifier.uid020045328-
dc.contributor.localauthorKim, Kwang-Jo-
dc.contributor.localauthor김광조-
Appears in Collection
ICE-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0