By Topic

A Secure and Scalable Transaction Protocol for Ubiquitous Sensor Network using RFID Systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Soo-Hyun Choi ; Department of Computer Science, University College London. Email: S.Choi@cs.ucl.ac.uk ; You-Hyeon Jeong

The RFID technology has ample growth potential since it can be applied to practically all areas, ranging from retail and logistics sectors to livestock management, home network systems, traffic control and hospital patient management. With the advent of this technology, it is possible to realize ubiquitous sensor network (USN) such that every object is given an RFID tag giving them a digital identity, so-called ubiquitous tag or ubiquitous sensor. However, it is clear that the biggest challenge for RFID technology is to provide benefits without threatening the privacy of information. Many solutions have been suggested for RFID systems, but none of them suits to the USN environment because of their security weakness or non-scalability. In this paper, we propose a secure and scalable transaction (SST) protocol for USN using RFID technology. The SST protocol uses the advanced encryption standard (AES) algorithm for authentication and encryption so that it can be free from tag cloning and privacy attack. Moreover, it is scalable in a sense that an RFID reader does not need to perform a shared key distribution and management. In analyzing SST protocol, we show how forward privacy is guaranteed and demonstrate the results.

Published in:

Advanced Communication Technology, 2008. ICACT 2008. 10th International Conference on  (Volume:3 )

Date of Conference:

17-20 Feb. 2008