Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/IAS.2009.216guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Zero-Collision RFID Tags Identification Based on CDMA

Published: 18 August 2009 Publication History

Abstract

One of the killer applications for Radio frequency identification (RFID) system is the automatic identification of physical objects. To do that, each object must be labeled with a RFID tag containing identifying data. However, collisions occur when several tags send their data simultaneously. This paper proposes a secure scheme for zero-collision RFID tags identification based on Code Division Multiple Access (CDMA) and hash-chain mechanics. The scheme not only allows several tags send their identifying data simultaneously without collision, but also provides the following secure properties for RFID reader and tags: mutual authentication, tag anonymity, robustness and forward secrecy.

Cited By

View all
  • (2015)An efficient detection scheme of node replication attacks for wireless sensor networksInternational Journal of Security and Networks10.1504/IJSN.2015.07244010:4(228-238)Online publication date: 1-Oct-2015
  • (2014)Turbocharging ambient backscatter communicationACM SIGCOMM Computer Communication Review10.1145/2740070.262631244:4(619-630)Online publication date: 17-Aug-2014
  • (2014)Enabling instantaneous feedback with full-duplex backscatterProceedings of the 20th annual international conference on Mobile computing and networking10.1145/2639108.2639136(67-78)Online publication date: 7-Sep-2014
  • Show More Cited By

Index Terms

  1. Zero-Collision RFID Tags Identification Based on CDMA
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    IAS '09: Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 01
    August 2009
    729 pages
    ISBN:9780769537443

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 18 August 2009

    Author Tags

    1. CDMA
    2. RFID identification
    3. collision
    4. hash chain
    5. mutual authentication

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 30 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2015)An efficient detection scheme of node replication attacks for wireless sensor networksInternational Journal of Security and Networks10.1504/IJSN.2015.07244010:4(228-238)Online publication date: 1-Oct-2015
    • (2014)Turbocharging ambient backscatter communicationACM SIGCOMM Computer Communication Review10.1145/2740070.262631244:4(619-630)Online publication date: 17-Aug-2014
    • (2014)Enabling instantaneous feedback with full-duplex backscatterProceedings of the 20th annual international conference on Mobile computing and networking10.1145/2639108.2639136(67-78)Online publication date: 7-Sep-2014
    • (2014)Turbocharging ambient backscatter communicationProceedings of the 2014 ACM conference on SIGCOMM10.1145/2619239.2626312(619-630)Online publication date: 17-Aug-2014

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media