S-search: Finding RFID tags using scalable and secure search protocol

Md Endadul Hoque, Farzana Rahman, Sheikh Iqbal Ahamed

Research output: Chapter in Book/Entry/PoemConference contribution

6 Scopus citations

Abstract

Massively deploying RFID systems that preserve data integrity and security is a major challenge of the coming years. Since RFID tags are extremely constrained in time and space, enforcing high level of security with excessive cryptographic computation is not possible. Secured mechanisms for tag authentication have been in the midst of researcher's interest for almost a decade. One extension of RFID authentication is RFID tag searching, which has not been given much attention so far. But we firmly believe that in near future tag searching will be a significant issue. And tag searching need to be scalable as RFID tags are deployed comprehensively within a system. In this paper we propose a scalable and lightweight RFID tag searching protocol. This protocol can search a particular tag efficiently as the approach is not based on exhaustive search. This approach does not employ extreme computing or cryptographic functions. Our proposed scalable search protocol is secured against major security threats and it is suitable to be used in numerous real life situations.

Original languageEnglish (US)
Title of host publicationAPPLIED COMPUTING 2010 - The 25th Annual ACM Symposium on Applied Computing
Pages439-443
Number of pages5
DOIs
StatePublished - 2010
Externally publishedYes
Event25th Annual ACM Symposium on Applied Computing, SAC 2010 - Sierre, Switzerland
Duration: Mar 22 2010Mar 26 2010

Publication series

NameProceedings of the ACM Symposium on Applied Computing

Other

Other25th Annual ACM Symposium on Applied Computing, SAC 2010
Country/TerritorySwitzerland
CitySierre
Period3/22/103/26/10

Keywords

  • ALOHA
  • RFID
  • scalability
  • search protocol
  • security

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'S-search: Finding RFID tags using scalable and secure search protocol'. Together they form a unique fingerprint.

Cite this