Secured tag identification using EDSA (Enhanced Distributed Scalable Architecture)

Sheikh Iqbal Ahamed, Farzana Rahman, Md Endadul Hoque

Research output: Chapter in Book/Entry/PoemConference contribution

1 Scopus citations

Abstract

RFID technology has become increasingly popular in todays society and plays an important role in daily life. However, the exploitation of this technology requires practical and secure solutions to overcome certain issues.. In the case of RFID systems, privacy protection and scalability are two conflicting goals. Nevertheless, in this paper we propose a hexagonal cell based distributed architecture which ensures improved scalability while maintaining privacy. The hexagonal architecture allows readers to co-operate with one another to identify tags without compromising scalability. Furthermore, this architecture uses serverless protocols for security assurance, cutting down set up and maintenance cost as well as traffic to server. To the best of our knowledge, we propose a combination of servered and serverless techniques within the same distributed architecture for the first time. Our proposed distributed scalable architecture together with the secure serverless protocols can be used in numerous real life situations.

Original languageEnglish (US)
Title of host publicationProceedings of the 23rd Annual ACM Symposium on Applied Computing, SAC'08
Pages1902-1907
Number of pages6
DOIs
StatePublished - 2008
Externally publishedYes
Event23rd Annual ACM Symposium on Applied Computing, SAC'08 - Fortaleza, Ceara, Brazil
Duration: Mar 16 2008Mar 20 2008

Publication series

NameProceedings of the ACM Symposium on Applied Computing

Other

Other23rd Annual ACM Symposium on Applied Computing, SAC'08
Country/TerritoryBrazil
CityFortaleza, Ceara
Period3/16/083/20/08

Keywords

  • Distributed
  • EDSA
  • Scalability
  • Serverless, Identification

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'Secured tag identification using EDSA (Enhanced Distributed Scalable Architecture)'. Together they form a unique fingerprint.

Cite this