Nowadays, traceability represents a key activity in many sectors. Many modern traceability systems are based on radio-frequency identification (RFID) technology. However, the distributed information stored on RFID tags involves new security problems. This paper presents the traceability multi-entity cryptography, a high-level data protection scheme based on public key cryptography that is able to protect RFID data for traceability and chain activities. This scheme is able to manage entities with different permissions, and it is especially suitable for applications that require complex Information Systems. Traceability multi-entity cryptography avoids industrial espionage, guarantees the information authenticity, protects the customer privacy, and detects malicious alterations of the information. In contrast to the state-of-the-art RFID security schemes, the proposed protocol is applicable to standard RFID tags without any cryptographic capability, and it does not require a central database.

A security protocol for RFID traceability / Gandino, Filippo; Montrucchio, Bartolomeo; Rebaudengo, Maurizio. - In: INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS. - ISSN 1074-5351. - STAMPA. - 30:6(2017), pp. N/A-N/A. [10.1002/dac.3109]

A security protocol for RFID traceability

GANDINO, FILIPPO;MONTRUCCHIO, BARTOLOMEO;REBAUDENGO, Maurizio
2017

Abstract

Nowadays, traceability represents a key activity in many sectors. Many modern traceability systems are based on radio-frequency identification (RFID) technology. However, the distributed information stored on RFID tags involves new security problems. This paper presents the traceability multi-entity cryptography, a high-level data protection scheme based on public key cryptography that is able to protect RFID data for traceability and chain activities. This scheme is able to manage entities with different permissions, and it is especially suitable for applications that require complex Information Systems. Traceability multi-entity cryptography avoids industrial espionage, guarantees the information authenticity, protects the customer privacy, and detects malicious alterations of the information. In contrast to the state-of-the-art RFID security schemes, the proposed protocol is applicable to standard RFID tags without any cryptographic capability, and it does not require a central database.
File in questo prodotto:
File Dimensione Formato  
DAC3109.pdf

non disponibili

Tipologia: 1. Preprint / submitted version [pre- review]
Licenza: Non Pubblico - Accesso privato/ristretto
Dimensione 1.33 MB
Formato Adobe PDF
1.33 MB Adobe PDF   Visualizza/Apri   Richiedi una copia
Gandino_et_al-2017-International_Journal_of_Communication_Systems.pdf

non disponibili

Tipologia: 2a Post-print versione editoriale / Version of Record
Licenza: Non Pubblico - Accesso privato/ristretto
Dimensione 514.6 kB
Formato Adobe PDF
514.6 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2643471
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo