Article Information  
A Trusted Naming Service for Things of Internet

Keywords: Things of Internet, RFID Security, ToI Management, EPC System Architecture.

Mehran University Research Journal of Engineering & Technology

Volume 31 ,  Issue 2

Imran  Ali  Jokhio , Sana  Hoor  Jokhio , Faisal  Karim Shaikh ,

References
1. EPCglobal, "Epcglobal Object Name Service (ONS) 1.0.1", Ratified Standard Specification, May, 2008.
2. Kin, D.W.E., Leong, S., and MunLeng, N.G., "EPC Network Architecture", Auto-ID Center MIT, White Paper, 2005.
3. Traub, G.A.K., "EPC Network Architecture Framework", Auto-ID Center/EPCglobal, Technology Reprint, July, 2005.
4. Tsougas, N., "RFID Security and Privacy Concerns", Proceedings of the 5th ACM Workshop on Wireless Security, pp. 31-31, New York, USA, 2006.
5. Henrici, D., “RFID Security and Privacy: Concepts, Protocols, and Architectures”, Lecture Notes in Electrical Engineering, Springer Publishing Company, Incorporated, 2008.
6. Kerschbaum, F., and Sorniotti, A., "RFID-Based Supply Chain Partner Authentication and Key Agreement", Proceedings of the Second ACM Conference on Wireless Network Security, pp. 41-50, New York, USA, 2009.
7. Kerschbaum, F., and Sorniotti, A., "RFID-Based Supply Chain Partner Authentication and Key Agreement", Proceedings of the Second ACM Conference on Wireless Network Security, pp. 41-50, New York, USA, 2009.
8. Koralalage, K.S., and Cheng, J., "A Comparative Study of RFID Solutions for Security and Privacy: Pop vs. Previous Solutions",Proceedings of the International Conference on Information Security and Assurance, IEEE Computer Society, pp. 342-349Washington, DC, USA, 2008.
9. Lim, T.L., Li, T., and Yeo, S.L., "A Cross-Layer Framework for Privacy Enhancement in RIFD Systems", Pervasive Mobile Computer, Volume 4, No. 6, pp. 889-905, 2008.
10. Seo, Y., "A Study on Scalable and Untraceable Authentication Protocol of RFID Tags", M.E. Thesis, School of Engineering Information and Communications University, Daejeon, Korea, December, 2007.
11. Langheinrich, M., "A Survey of RIFD Privacy Approaches", Personal Ubiquitous Computer, Volume 13, No. 6, pp. 413-421, 2009.
12. Hopper, N., and Blum, M., "A Secure Human-Computer Authentication Scheme", Carnegie Mellon University, CMU-CS-139, Technical Report, 2000.
13. EPCglobal, “EPC Generation 1 Tag Data Standards”, Standard Specifications 1.27, EPCglobal, May, 2005.
14. EPCglobal, “EPCglobal Tag Data Translation (TDT)”, Technical Report 1.4, EPC-Global, June, 2009.
15. Liberty for Users or Vendors? “Computer Fraud and Security”, No. 8, March, 2002.
16. Needleman, M., “The Shibboleth Authentication/ Authorization System”, Serials Review, Volume 30, No. 3, pp. 252-253, 2004.
17. WS Federation Standard Version 1.1 http:// download.boulder.ibm.com/ibmdl/pub/software/dw/specs/ ws-fed/WS- Federation-V1-1B.pdf, Last accessing date, December, 2011.