Back to Search Start Over

Tamper Detection for Ubiquitous RFID-Enabled Supply Chain.

Authors :
Yue Hao
Jiming Liu
Yu-Ping Wang
Yiu-ming Cheung
Hujun Yin
Licheng Jiao
Jianfeng Ma
Yong-Chang Jiao
Potdar, Vidyasagar
Wu, Chen
Chang, Elizabeth
Source :
Computational Intelligence & Security (9783540308195); 2005, p273-278, 6p
Publication Year :
2005

Abstract

Security and privacy are two primary concerns in RFID adoption. In this paper we focus on security issues in general and data tampering in particular. Here we present a conceptual framework to detect and identify data tampering in RFID tags. The paper surveys the existing literature and proposes to add a tamper detection component in the existing RFID middleware architecture. The tamper detection component is supported by mathematical algorithm to embed and extract secret information which can be employed to detect data tampering. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISBNs :
9783540308195
Database :
Supplemental Index
Journal :
Computational Intelligence & Security (9783540308195)
Publication Type :
Book
Accession number :
32885736
Full Text :
https://doi.org/10.1007/11596981_40