S3PR: Secure serverless search protocols for RFID

Sheikh I. Ahamed, Farzana Rahman, Endadul Hoque, Fahim Kawsar, Tatsuo Nakajima

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Citations (Scopus)

    Abstract

    For RFID tags to proliferate in our day to day life, they will have to offer practical, low cost and secured mechanisms for tag authentication which has been in the midst of researcher's interest for almost a decade. One extension of RFID authentication is RFID tag searching, which has not been given much attention so far. But we firmly believe that in near future tag searching will be a significant issue. In this paper we propose a lightweight and serverless RFID tag searching protocol. This protocol can search a particular tag efficiently without server's intervention. Furthermore they are secured against major security threats.

    Original languageEnglish
    Title of host publicationProceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
    Pages187-192
    Number of pages6
    DOIs
    Publication statusPublished - 2008
    Event2nd International Conference on Information Security and Assurance, ISA 2008 - Busan
    Duration: 2008 Apr 242008 Apr 26

    Other

    Other2nd International Conference on Information Security and Assurance, ISA 2008
    CityBusan
    Period08/4/2408/4/26

    Fingerprint

    Radio frequency identification (RFID)
    threat
    Network protocols
    costs
    Authentication
    Servers
    Tag
    Radio frequency identification
    Costs

    Keywords

    • RFID security
    • Serverless search protocol

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Information Systems and Management
    • Electrical and Electronic Engineering
    • Communication

    Cite this

    Ahamed, S. I., Rahman, F., Hoque, E., Kawsar, F., & Nakajima, T. (2008). S3PR: Secure serverless search protocols for RFID. In Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008 (pp. 187-192). [4511560] https://doi.org/10.1109/ISA.2008.70

    S3PR : Secure serverless search protocols for RFID. / Ahamed, Sheikh I.; Rahman, Farzana; Hoque, Endadul; Kawsar, Fahim; Nakajima, Tatsuo.

    Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. 2008. p. 187-192 4511560.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Ahamed, SI, Rahman, F, Hoque, E, Kawsar, F & Nakajima, T 2008, S3PR: Secure serverless search protocols for RFID. in Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008., 4511560, pp. 187-192, 2nd International Conference on Information Security and Assurance, ISA 2008, Busan, 08/4/24. https://doi.org/10.1109/ISA.2008.70
    Ahamed SI, Rahman F, Hoque E, Kawsar F, Nakajima T. S3PR: Secure serverless search protocols for RFID. In Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. 2008. p. 187-192. 4511560 https://doi.org/10.1109/ISA.2008.70
    Ahamed, Sheikh I. ; Rahman, Farzana ; Hoque, Endadul ; Kawsar, Fahim ; Nakajima, Tatsuo. / S3PR : Secure serverless search protocols for RFID. Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. 2008. pp. 187-192
    @inproceedings{9171bbb8075a4b9a9032b37a96a81642,
    title = "S3PR: Secure serverless search protocols for RFID",
    abstract = "For RFID tags to proliferate in our day to day life, they will have to offer practical, low cost and secured mechanisms for tag authentication which has been in the midst of researcher's interest for almost a decade. One extension of RFID authentication is RFID tag searching, which has not been given much attention so far. But we firmly believe that in near future tag searching will be a significant issue. In this paper we propose a lightweight and serverless RFID tag searching protocol. This protocol can search a particular tag efficiently without server's intervention. Furthermore they are secured against major security threats.",
    keywords = "RFID security, Serverless search protocol",
    author = "Ahamed, {Sheikh I.} and Farzana Rahman and Endadul Hoque and Fahim Kawsar and Tatsuo Nakajima",
    year = "2008",
    doi = "10.1109/ISA.2008.70",
    language = "English",
    isbn = "9780769531267",
    pages = "187--192",
    booktitle = "Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008",

    }

    TY - GEN

    T1 - S3PR

    T2 - Secure serverless search protocols for RFID

    AU - Ahamed, Sheikh I.

    AU - Rahman, Farzana

    AU - Hoque, Endadul

    AU - Kawsar, Fahim

    AU - Nakajima, Tatsuo

    PY - 2008

    Y1 - 2008

    N2 - For RFID tags to proliferate in our day to day life, they will have to offer practical, low cost and secured mechanisms for tag authentication which has been in the midst of researcher's interest for almost a decade. One extension of RFID authentication is RFID tag searching, which has not been given much attention so far. But we firmly believe that in near future tag searching will be a significant issue. In this paper we propose a lightweight and serverless RFID tag searching protocol. This protocol can search a particular tag efficiently without server's intervention. Furthermore they are secured against major security threats.

    AB - For RFID tags to proliferate in our day to day life, they will have to offer practical, low cost and secured mechanisms for tag authentication which has been in the midst of researcher's interest for almost a decade. One extension of RFID authentication is RFID tag searching, which has not been given much attention so far. But we firmly believe that in near future tag searching will be a significant issue. In this paper we propose a lightweight and serverless RFID tag searching protocol. This protocol can search a particular tag efficiently without server's intervention. Furthermore they are secured against major security threats.

    KW - RFID security

    KW - Serverless search protocol

    UR - http://www.scopus.com/inward/record.url?scp=51349134046&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=51349134046&partnerID=8YFLogxK

    U2 - 10.1109/ISA.2008.70

    DO - 10.1109/ISA.2008.70

    M3 - Conference contribution

    AN - SCOPUS:51349134046

    SN - 9780769531267

    SP - 187

    EP - 192

    BT - Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008

    ER -