TY - GEN
T1 - A Lightweight Path Authentication Protocol for RFID-Based Supply Chains
AU - Qian, Yuyin
AU - Zeng, Peng
AU - Shen, Zuming
AU - Choo, Kim Kwang Raymond
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/9/5
Y1 - 2018/9/5
N2 - Due to the ability for real-time tracking and tracing of products and components, Radio Frequency Identification (RFID) technology has an important role in supply chain man-agement. However, the limited memory of tags and their lack of computing capability complicate the challenge of designing an efficient and secure tag path authentication protocol for an RFID-based supply chain. Recently in 2016, Wang et al. [1] proposed an efficient path authentication protocol with reduced requirements on the tag memory. Specifically, for a single tag, it is 800 bits instead of 960 bits in the tag path authentication protocol 'Tracker' [2]). In this paper, we propose a new tag path authentication protocol for RFID-based supply chains, which further reduces the memory space from 800 bits to 640 bits. At the same time, the new protocol reduces the computation cost required at each reader and removes the strong assumption that the manager in the system needs to store all readers' private keys in Wang et al.'s protocol and the 'Tracker'.
AB - Due to the ability for real-time tracking and tracing of products and components, Radio Frequency Identification (RFID) technology has an important role in supply chain man-agement. However, the limited memory of tags and their lack of computing capability complicate the challenge of designing an efficient and secure tag path authentication protocol for an RFID-based supply chain. Recently in 2016, Wang et al. [1] proposed an efficient path authentication protocol with reduced requirements on the tag memory. Specifically, for a single tag, it is 800 bits instead of 960 bits in the tag path authentication protocol 'Tracker' [2]). In this paper, we propose a new tag path authentication protocol for RFID-based supply chains, which further reduces the memory space from 800 bits to 640 bits. At the same time, the new protocol reduces the computation cost required at each reader and removes the strong assumption that the manager in the system needs to store all readers' private keys in Wang et al.'s protocol and the 'Tracker'.
KW - RFID
KW - lightweight protocol
KW - path authentication
KW - privacy
KW - security
KW - track and trace
UR - https://www.scopus.com/pages/publications/85054074156
U2 - 10.1109/TrustCom/BigDataSE.2018.00178
DO - 10.1109/TrustCom/BigDataSE.2018.00178
M3 - 会议稿件
AN - SCOPUS:85054074156
SN - 9781538643877
T3 - Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018
SP - 1297
EP - 1302
BT - Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018
Y2 - 31 July 2018 through 3 August 2018
ER -