Document Type

Conference Proceeding

Language

eng

Format of Original

6 p.

Publication Date

5-2007

Publisher

Institute of Electrical and Electronics Engineers (IEEE)

Source Publication

21st International Conference on Advanced Information Networking and Applications Workshops

Source ISSN

978-0-7695-2847-2

Original Item ID

doi: 10.1109/AINAW.2007.48

Abstract

The ubiquitous adoption of RFID technology is becoming integral part of our life. The stringent behavior of RFID system makes it more prone to impendence situations. Consequently, it needs more enduring and testing to become less susceptible to attacks without compromising the crucial key factors like, memory, cost, speed, computation and handling. An approach without concerning all these factors is not an acceptable approach. In this paper, we present a more persistent solution that provides security without compromising the crucial key factors and addressing all security issues like eavesdropping, tracking, cloning and replay attacks.

Comments

Accepted version. Published as part of the proceedings of the conference, 21st International Conference on Advanced Information Networking and Applications Workshops, 2007: 182-187. DOI. © 2007 The Institute of Electrical and Electronics Engineers. Used with permission.

ahamed_7709acc.docx (311 kB)
ADA Accessible Version

Share

COinS