Abstract | ||
---|---|---|
In this paper, we focus on designing of path-checking protocols to verify the valid paths in supply chains. By inputting a valid path, the reader at the check point is able to verify whether the tags have passed through the valid path or not. we propose a path-checking solution based on sequential aggregate message authentication codes. For security and privacy considerations, we add mutual authentication into path-checking protocols. In order to save resources, we use SQUASH as message authentication codes which is considered to be suited for RFID systems. Finally, we do some security and privacy analysis. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1007/978-3-642-34129-8_38 | ICICS |
Keywords | Field | DocType |
message authentication code,valid path,privacy analysis,check point,path-checking protocol,rfid-based supply chain,rfid system,privacy consideration,privacy-preserving path-checking solution,mutual authentication,path-checking solution,sequential aggregate message authentication | Mutual authentication,Message authentication code,Computer science,Computer security,Computer network,Data Authentication Algorithm,Supply chain,Privacy analysis,Distributed computing | Conference |
Citations | PageRank | References |
2 | 0.39 | 9 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
wei xin | 1 | 25 | 5.96 |
Huiping Sun | 2 | 40 | 8.68 |
Tao Yang | 3 | 10 | 5.65 |
Zhi Guan | 4 | 24 | 4.23 |
Zhong Chen | 5 | 503 | 58.35 |