An Authentication Broker Service for Secure and Confidential EPC

被引:0
|
作者
Jokhio, Imran Ali [1 ]
Xu, Jie [1 ]
机构
[1] Univ Leeds, Sch Comp, Leeds, W Yorkshire, England
关键词
RFID authentication; RFID security; EPC network authentication;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Radio Frequency Identification technology (RFID) has a wide range of potential applications and many successful stories. However, there are certain issues regarding Electronic Product Code (EPC) network architecture and tag-reader security models, such as security, privacy and scalability of the EPC network whilst authenticating RF tags. The EPC network architecture specification has no authentication process to authenticate an RF tag prior to knowing its EPC, but a tag is authenticated at EPC information Service (EPCIS) instead. This may result in the leakage of tag's EPC before its authentication. There is a need of an authentication process in the EPC network so that tag's EPC may only be known once it is successfully authenticated. In this paper we have proposed an authentication broker service for EPC network. A distributed design of the authentication broker service is also discussed.
引用
收藏
页码:249 / 256
页数:8
相关论文
共 50 条
  • [1] Secure Web Service Composition with Untrusted Broker
    Carminati, Barbara
    Ferrari, Elena
    Ngoc Hong Tran
    2014 IEEE 21ST INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2014), 2014, : 137 - 144
  • [2] END-TO-END LEARNING OF SECURE WIRELESS COMMUNICATIONS: CONFIDENTIAL TRANSMISSION AND AUTHENTICATION
    Sun, Zhuo
    Wu, Hengmiao
    Zhao, Chenglin
    Yue, Gang
    IEEE WIRELESS COMMUNICATIONS, 2020, 27 (05) : 88 - 95
  • [3] A Study on Service Architecture for Secure Authentication System
    Kim, Sung Jin
    Ma, Myung Chul
    Lee, Hyeon-Kyung
    Kim, Jong-Bae
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 9 - 20
  • [4] Secure Access & Authentication For Collaborative InterCloud Exchange Service
    Guenane, Fouad Amine
    Serhrouchni, Ahmed
    2015 INTERNATIONAL CONFERENCE ON CYBER SECURITY OF SMART CITIES, INDUSTRIAL CONTROL AND COMMUNICATIONS (SSIC), 2015,
  • [5] A Secure Authentication Approach for the Smart Terminal and Edge Service
    He, Qian
    Song, Jing
    Wang, Shicheng
    Liu, Peng
    Jiang, Bingcheng
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PT III, 2022, 13473 : 419 - 430
  • [6] Secure Access Authentication for Media Independent Information Service
    Li, Guangsong
    Jiang, Qi
    Chen, Xi
    Ma, Jianfeng
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 409 - 413
  • [7] AN AUTHENTICATION BROKER FOR VIRTUAL LABORATORIES
    Malta, Ricardo
    Fasca, Jose
    Rogado, Jose Quintino
    4TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE (INTED 2010), 2010, : 5826 - 5835
  • [8] A Study on Providing the Reliable and Secure SMS Authentication Service
    Lee, Jaesik
    Oh, Yongseok
    2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 620 - 624
  • [9] Integrated EPC Information Service Authentication Using OpenID in Cross Domains
    Liu, Yan-Chen
    Chien, Hung-Yu
    Chen, Yu-Chang
    Yang, Chu-Sing
    Lo, Nai-Wei
    RADIO FREQUENCY IDENTIFICATION SYSTEM SECURITY (RFIDSEC'11), 2011, 6 : 144 - 153
  • [10] Study of Broker-Based Mutual Authentication with Key Agreement for Secure Multi-Cloud Computing
    Kim, Bumryong
    Choi, Keunchang
    Kim, Hyungjoo
    ADVANCED SCIENCE LETTERS, 2016, 22 (09) : 2420 - 2424