{"title":"Lightweight Security Settings in RFID Technology for Smart Agri-Food Certification","authors":"L. Calderoni, D. Maio","doi":"10.1109/SMARTCOMP50058.2020.00050","DOIUrl":null,"url":null,"abstract":"In this paper we propose a novel technique to implement secure and efficient applications for the agri-food certification chain. Our proposal relies on RFID technologies which is probably the most relevant enabling solution for ubiquitous IoT systems. We analyze a recently introduced and promising RFID tag and we prove it is possible to certify its genuineness without installing any third party application upon the consumer smartphone. The proposed solution is based on a lightweight security technique which provides the mirroring of the tag identifier combined with the encryption of a NDEF formatted file.","PeriodicalId":346827,"journal":{"name":"2020 IEEE International Conference on Smart Computing (SMARTCOMP)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Conference on Smart Computing (SMARTCOMP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SMARTCOMP50058.2020.00050","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In this paper we propose a novel technique to implement secure and efficient applications for the agri-food certification chain. Our proposal relies on RFID technologies which is probably the most relevant enabling solution for ubiquitous IoT systems. We analyze a recently introduced and promising RFID tag and we prove it is possible to certify its genuineness without installing any third party application upon the consumer smartphone. The proposed solution is based on a lightweight security technique which provides the mirroring of the tag identifier combined with the encryption of a NDEF formatted file.