6 research outputs found

    Two Rounds RFID Grouping-Proof Protocol

    Get PDF

    Secure mobile edge server placement using multi-agent reinforcement learning

    Get PDF
    Funding Information: Funding: This work is supported by King Khaled University under Grant Agreement No. 6204.Peer reviewedPublisher PD

    Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains

    Get PDF
    Abstract—In this paper, we point out the use of secret sharing strategies as a promising solution for managing the key distribu-tion and recovery in the Radio Frequency IDentification (RFID)-enabled supply chains. To this end, we designed a new model based on a secret sharing approach to solve the key distribution issue within the supply chains. We further proposed a secret key update protocol incorporating a resynchronisation capability to counter the disruptive effects of location tracking, replay attacks, and desynchronisation attacks. Compared with relevant approaches, our work demonstrates a number of advantages in terms of security and performance. Index Terms—RFID; key management; secret sharing; I
    corecore