S3PR: Secure serverless search protocols for RFID

Sheikh I. Ahamed, Farzana Rahman, Endadul Hoque, Fahim Kawsar, Tatsuo Nakajima

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Scopus citations

Abstract

For RFID tags to proliferate in our day to day life, they will have to offer practical, low cost and secured mechanisms for tag authentication which has been in the midst of researcher's interest for almost a decade. One extension of RFID authentication is RFID tag searching, which has not been given much attention so far. But we firmly believe that in near future tag searching will be a significant issue. In this paper we propose a lightweight and serverless RFID tag searching protocol. This protocol can search a particular tag efficiently without server's intervention. Furthermore they are secured against major security threats.

Original languageEnglish (US)
Title of host publicationProceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
Pages187-192
Number of pages6
DOIs
StatePublished - Sep 15 2008
Externally publishedYes
Event2nd International Conference on Information Security and Assurance, ISA 2008 - Busan, Korea, Republic of
Duration: Apr 24 2008Apr 26 2008

Publication series

NameProceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008

Conference

Conference2nd International Conference on Information Security and Assurance, ISA 2008
CountryKorea, Republic of
CityBusan
Period4/24/084/26/08

Keywords

  • RFID security
  • Serverless search protocol

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems and Management
  • Electrical and Electronic Engineering
  • Communication

Fingerprint Dive into the research topics of 'S<sup>3</sup>PR: Secure serverless search protocols for RFID'. Together they form a unique fingerprint.

  • Cite this

    Ahamed, S. I., Rahman, F., Hoque, E., Kawsar, F., & Nakajima, T. (2008). S3PR: Secure serverless search protocols for RFID. In Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008 (pp. 187-192). [4511560] (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008). https://doi.org/10.1109/ISA.2008.70