Secure communication for RFIDs proactive information security within computational security

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations

    Abstract

    We consider repeated communication sessions between a sender (e.g., Radio Frequency Identification, RFID, reader) and a receiver (RFID). A proactive information security scheme is proposed. The scheme is based on the assumption that the information exchanged during at least one of every n successive communication sessions is not exposed to an adversary. Then a computational secure scheme based on the information secure scheme is used to ensure that even in the case that the adversary listens to all the information exchanges, the communication between the sender and the receiver is secure. In particular, the scheme can be used in the domain of remote controls (e.g., for cars).

    Original languageEnglish
    Title of host publicationStabilization, Safety, and Security of Distributed Systems - 8th International Symposium, SSS 2006. Proceedings
    PublisherSpringer Verlag
    Pages290-303
    Number of pages14
    ISBN (Print)3540490183, 9783540490180
    DOIs
    StatePublished - 1 Jan 2006
    Event8th International Symposium on Self-Stabilizing Systems, SSS 2006 - Dallas, TX, United States
    Duration: 17 Nov 200619 Nov 2006

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume4280 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference8th International Symposium on Self-Stabilizing Systems, SSS 2006
    Country/TerritoryUnited States
    CityDallas, TX
    Period17/11/0619/11/06

    Keywords

    • Authentication protocol
    • Computational security
    • Information security
    • Pseudo-random numbers
    • RFID tags

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'Secure communication for RFIDs proactive information security within computational security'. Together they form a unique fingerprint.

    Cite this