Date of Award

Fall 2007

Document Type

Thesis - Restricted

Degree Name

Master of Science (MS)

Department

Mathematics, Statistics and Computer Science

First Advisor

Ahamed, Sheikh I.

Second Advisor

Harris, Douglas

Third Advisor

Madiraju, Praveen

Abstract

The ubiquitous adoption of RFID technology in everyday life has become momentous. The stringent behavior of RFID system makes it more prone to impendence situations. Consequently, it needs more enduring and an attack proof approach without neglecting the crucial key factors like, memory, cost, speed, computation and handling. An approach without concerning all these factors is not an acceptable approach. Supply chains are major consumers of this system. This system makes it convenient and efficient for the daily lives and helps in more production plus more profit. Although, this new system creates many threats to the daily life and need security and privacy. In this thesis, we present a more persistent solution that provides security without contempting the crucial key factors and addressing all security issues like eavesdropping, tracking, cloning and replay attacks. We have also introduced a new idea to our approach to overcome the problem of offline mode operation of the reader from backend database known as "ubiquitous access".

Share

COinS

Restricted Access Item

Having trouble?