Efficient Tag Path Authentication Protocol with Less Tag Memory

Logistical management has been advanced rapidly in these years, taking advantage of the broad connectivity of the Internet. As it becomes an important part of our lives, it also raises many challenging issues, e.g., the counterfeits of expensive goods pose a serious threat to supply chain management...

Full description

Saved in:
Bibliographic Details
Main Authors: WANG, Hongbing, Yingjiu LI, ZHANG, Zongyang, ZHAO, Yunlei
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2016
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/3382
https://ink.library.smu.edu.sg/context/sis_research/article/4383/viewcontent/EfficientTagPathAuthenticationProtocolwithLessTagMemory.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-4383
record_format dspace
spelling sg-smu-ink.sis_research-43832017-01-09T08:17:28Z Efficient Tag Path Authentication Protocol with Less Tag Memory WANG, Hongbing Yingjiu LI, ZHANG, Zongyang ZHAO, Yunlei Logistical management has been advanced rapidly in these years, taking advantage of the broad connectivity of the Internet. As it becomes an important part of our lives, it also raises many challenging issues, e.g., the counterfeits of expensive goods pose a serious threat to supply chain management. As a result, path authentication becomes especially important in supply chain management, since it helps us maintain object pedigree and supply chain integrity. Meanwhile, tag path authentication must meet a series of security requirements, such as authentication, privacy, and unlinkability. In addition, the authentication protocol must be efficient.In 2011, the first tag path authentication protocol in an RFID-based supply chain, named “Tracker”, is proposed by Blass et al. in NDSS’11. They have made an important breakthrough in this research area. In this paper, we improve their work and propose a more efficient tag path authentication protocol in an RFID-based supply chain, which meets all the above mentioned security requirements. Our result shows that the proposed protocol can significantly reduce both computational overhead and memory requirement on tags, compared with the previous work. 2016-11-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3382 info:doi/10.1007/978-3-319-49151-6_18 https://ink.library.smu.edu.sg/context/sis_research/article/4383/viewcontent/EfficientTagPathAuthenticationProtocolwithLessTagMemory.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University RFID Tag path authentication Security and privacy Unlinkability Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic RFID
Tag path authentication
Security and privacy
Unlinkability
Information Security
spellingShingle RFID
Tag path authentication
Security and privacy
Unlinkability
Information Security
WANG, Hongbing
Yingjiu LI,
ZHANG, Zongyang
ZHAO, Yunlei
Efficient Tag Path Authentication Protocol with Less Tag Memory
description Logistical management has been advanced rapidly in these years, taking advantage of the broad connectivity of the Internet. As it becomes an important part of our lives, it also raises many challenging issues, e.g., the counterfeits of expensive goods pose a serious threat to supply chain management. As a result, path authentication becomes especially important in supply chain management, since it helps us maintain object pedigree and supply chain integrity. Meanwhile, tag path authentication must meet a series of security requirements, such as authentication, privacy, and unlinkability. In addition, the authentication protocol must be efficient.In 2011, the first tag path authentication protocol in an RFID-based supply chain, named “Tracker”, is proposed by Blass et al. in NDSS’11. They have made an important breakthrough in this research area. In this paper, we improve their work and propose a more efficient tag path authentication protocol in an RFID-based supply chain, which meets all the above mentioned security requirements. Our result shows that the proposed protocol can significantly reduce both computational overhead and memory requirement on tags, compared with the previous work.
format text
author WANG, Hongbing
Yingjiu LI,
ZHANG, Zongyang
ZHAO, Yunlei
author_facet WANG, Hongbing
Yingjiu LI,
ZHANG, Zongyang
ZHAO, Yunlei
author_sort WANG, Hongbing
title Efficient Tag Path Authentication Protocol with Less Tag Memory
title_short Efficient Tag Path Authentication Protocol with Less Tag Memory
title_full Efficient Tag Path Authentication Protocol with Less Tag Memory
title_fullStr Efficient Tag Path Authentication Protocol with Less Tag Memory
title_full_unstemmed Efficient Tag Path Authentication Protocol with Less Tag Memory
title_sort efficient tag path authentication protocol with less tag memory
publisher Institutional Knowledge at Singapore Management University
publishDate 2016
url https://ink.library.smu.edu.sg/sis_research/3382
https://ink.library.smu.edu.sg/context/sis_research/article/4383/viewcontent/EfficientTagPathAuthenticationProtocolwithLessTagMemory.pdf
_version_ 1770573152120733696