Please use this identifier to cite or link to this item: https://ptsldigital.ukm.my/jspui/handle/123456789/476549
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorAhmad Patel, Prof. Dr.-
dc.contributor.authorAzzam Zavvari (P53612)-
dc.date.accessioned2023-10-06T09:20:51Z-
dc.date.available2023-10-06T09:20:51Z-
dc.date.issued2012-06-25-
dc.identifier.otherukmvital:119301-
dc.identifier.urihttps://ptsldigital.ukm.my/jspui/handle/123456789/476549-
dc.descriptionRadio frequency identification (RFID) is a system that transmits an entity’s identity in the form of a unique serial number wirelessly using radio waves. RFID systems are broadly applied in various applications such as supply chain, personal identification and patient care management. The remarkable increase in use of RFID technology has resulted in a number of security and privacy issues. Even though there are several security protocols that deal with these issues, they are so complicated to be applied in low-cost RFID systems which make them expensive to use. For example, employing the complicated functions such as hash and encryption functions results in escalating the implementation costs of RFID tags and system resources. Moreover, previous security schemes suffer from the lack of a global standard to attain interworking across multi vendor systems and platforms, and as well as high time consuming computational processes on the database activities. Therefore, developing a new RFID security model based on a global standard with a high degree of security, low computational complexity and implementation cost is essential and a challenge. This thesis evaluates the existing security protocols, assesses their strengths and vulnerabilities, and subsequently a new mutual authentication protocol conforming to EPCglobal Class-1 Generation-2 de facto standard is proposed to overcome the weakness and vulnerabilities. This new protocol reduces the computational complexity and implementation cost by applying simple functions such as PRNG and XOR on the tag side and shifting the necessary complex functions to the reader side to reduce the computational cost. This protocol is also designed to minimise database loading. Finally, a critical evaluation and comparison between the proposed protocol and the current protocols is conducted to show that the proposed protocol is more resistant than previous protocols against the attacks such as eavesdropping, forward security, tracking and impersonation. The results from the theoretical analysis and evaluation, as well as the experimental simulation of the protocol behaviour confirms that the proposed AZAM scheme is more secure and efficient compared to that of other contemporaries and competitor schemes.,Certification of Master's/Doctoral Thesis" is not available-
dc.language.isoeng-
dc.publisherUKM, Bangi-
dc.relationFaculty of Information Science and Technology / Fakulti Teknologi dan Sains Maklumat-
dc.rightsUKM-
dc.subjectRFID-
dc.subjectSecurity protocols-
dc.subjectComputer network systems-
dc.subjectUniversiti Kebangsaan Malaysia -- Dissertations-
dc.titleLow-cost mutual authentication protocol for EPCGlobal Class-1 Generation-2 standard-
dc.typetheses-
dc.format.pages104-
dc.identifier.callnoTK6570.I34Z345 2012 3 tesis-
dc.identifier.barcode004712 (2012)-
Appears in Collections:Faculty of Information Science and Technology / Fakulti Teknologi dan Sains Maklumat

Files in This Item:
File Description SizeFormat 
ukmvital_119301+SOURCE1+SOURCE1.0.PDF
  Restricted Access
1.17 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.