A Trusted Naming Service for Things of Internet
Keywords: Things of Internet, RFID Security, ToI Management, EPC System
Architecture.
Mehran University Research Journal of Engineering & Technology
Volume 31 , Issue 2
Imran Ali Jokhio , Sana Hoor Jokhio , Faisal Karim Shaikh ,
References
1. |
EPCglobal, "Epcglobal Object Name Service (ONS)
1.0.1", Ratified Standard Specification, May, 2008. |
2. |
Kin, D.W.E., Leong, S., and MunLeng, N.G., "EPC
Network Architecture", Auto-ID Center MIT, White
Paper, 2005. |
3. |
Traub, G.A.K., "EPC Network Architecture Framework",
Auto-ID Center/EPCglobal, Technology Reprint,
July, 2005. |
4. |
Tsougas, N., "RFID Security and Privacy Concerns",
Proceedings of the 5th ACM Workshop on Wireless
Security, pp. 31-31, New York, USA, 2006. |
5. |
Henrici, D., “RFID Security and Privacy: Concepts,
Protocols, and Architectures”, Lecture Notes in Electrical
Engineering, Springer Publishing Company,
Incorporated, 2008. |
6. |
Kerschbaum, F., and Sorniotti, A., "RFID-Based Supply
Chain Partner Authentication and Key Agreement",
Proceedings of the Second ACM Conference on Wireless
Network Security, pp. 41-50, New York, USA, 2009. |
7. |
Kerschbaum, F., and Sorniotti, A., "RFID-Based Supply
Chain Partner Authentication and Key Agreement",
Proceedings of the Second ACM Conference on Wireless
Network Security, pp. 41-50, New York, USA, 2009. |
8. |
Koralalage, K.S., and Cheng, J., "A Comparative Study
of RFID Solutions for Security and Privacy: Pop vs.
Previous Solutions",Proceedings of the International
Conference on Information Security and Assurance,
IEEE Computer Society, pp. 342-349Washington, DC,
USA, 2008. |
9. |
Lim, T.L., Li, T., and Yeo, S.L., "A Cross-Layer
Framework for Privacy Enhancement in RIFD Systems",
Pervasive Mobile Computer, Volume 4, No. 6,
pp. 889-905, 2008. |
10. |
Seo, Y., "A Study on Scalable and Untraceable
Authentication Protocol of RFID Tags", M.E. Thesis,
School of Engineering Information and Communications
University, Daejeon, Korea, December, 2007. |
11. |
Langheinrich, M., "A Survey of RIFD Privacy
Approaches", Personal Ubiquitous Computer,
Volume 13, No. 6, pp. 413-421, 2009. |
12. |
Hopper, N., and Blum, M., "A Secure Human-Computer
Authentication Scheme", Carnegie Mellon University,
CMU-CS-139, Technical Report, 2000. |
13. |
EPCglobal, “EPC Generation 1 Tag Data Standards”,
Standard Specifications 1.27, EPCglobal, May, 2005. |
14. |
EPCglobal, “EPCglobal Tag Data Translation (TDT)”,
Technical Report 1.4, EPC-Global, June, 2009. |
15. |
Liberty for Users or Vendors? “Computer Fraud and
Security”, No. 8, March, 2002. |
16. |
Needleman, M., “The Shibboleth Authentication/
Authorization System”, Serials Review, Volume 30,
No. 3, pp. 252-253, 2004. |
17. |
WS Federation Standard Version 1.1 http://
download.boulder.ibm.com/ibmdl/pub/software/dw/specs/
ws-fed/WS- Federation-V1-1B.pdf, Last accessing date,
December, 2011. |
|
|
|