Safe RFID system modeling using shared key pool in ubiquitous environments

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In a Ubiquitous environment many individual devices which have the communication ability with the computation ability are connected with one another. For this change we must be preceded study of Radio Frequency Identification (RFID) afterward research of a sensor network. And we must grasp the threat to protect the RFID system. In this paper we propose safe RFID system modeling based on shared key pool in ubiquitous environment. This proposed modeling is secured to RFID system from many security threat and privacy problem, and it has shorter access delay time. We expect this proposed modeling to be used in ubiquitous environment for the RFID system being safe. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Kim, J., & Ryou, H. (2005). Safe RFID system modeling using shared key pool in ubiquitous environments. In Lecture Notes in Computer Science (Vol. 3645, pp. 831–840). Springer Verlag. https://doi.org/10.1007/11538356_86

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free