Abstract
This paper presents a privacy-preserving pathauthentication method for supply chain management using RFID. Comparedwith previous works, our scheme employs only symmetric encryption and message authentication codes. This reduces computation and communication overhead. The proposed method also supports high-level privacy without the need for tamper-proof tags as compared with the previous methods. Performance analysis demonstrates that the proposed scheme requires far lesscomputation resource than recent works, proving that less than 1 minute is enough to verify 100000 RFIDs in a conventional reader environment.
Original language | English |
---|---|
Pages (from-to) | 23-26 |
Number of pages | 4 |
Journal | Advances in Electrical and Computer Engineering |
Volume | 13 |
Issue number | 1 |
DOIs | |
State | Published - Feb 2013 |