An improved authentication protocol for mobile agent device in RFID environment

被引:4
作者
Wei, Chia-Hui [2 ,3 ]
Hwang, Min-Shiang [1 ]
Chin, Augustin Yeh-Hao [2 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[2] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[3] Natl Cent Lib, Taipei 10001, Taiwan
关键词
authentication; RFID; security; mobile agent; mobile communication; PRIVACY; SECURITY; FRAMEWORK; TRACKING;
D O I
10.1504/IJMC.2012.048884
中图分类号
G2 [信息与知识传播];
学科分类号
05 ; 0503 ;
摘要
In the past researches, most of the authentication protocols were designed in an effort to solve the RFID security and privacy problem regarding the encrypted communication between the database and readers, and readers and tags. Based on the proposal of Mobile Agent device for RFID privacy Protection (MARP), some security problems have been exposed. Later on, protecting the privacy with a mobile agent device in RFID environment (eMARP) has shown improvement on MARP. The mobile agent device provides more powerful computation than the tag, in addition to the privacy protection along with the forgery detection. However, we found out that the authentication protocol of eMARP could not resist location tracking. Therefore, we will discuss and demonstrate that the eMARP-based RFID system does not have ability to achieve location tracking in this paper. We have improved the authentication protocol of eMARP-based RFID system and also have eliminated its vulnerability.
引用
收藏
页码:508 / 520
页数:13
相关论文
共 21 条
[1]  
[Anonymous], INT J NETW SECUR
[2]  
Cao T., 2009, INT J NETWORK SECURI, V9, P95
[3]   RFID in retail: a framework for examining consumers' ethical perceptions [J].
Chen, Jengchung V. ;
Pfleuger, Paul, Jr. .
INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2008, 6 (01) :53-66
[4]   Architecture design and performance evaluation of RFID object tracking systems [J].
Chen, Jiann-Liang ;
Chen, Ming-Chiao ;
Chen, Chien-Wu ;
Chang, Yao-Chung .
COMPUTER COMMUNICATIONS, 2007, 30 (09) :2070-2086
[5]   The state of RFID for effective baggage tracking in the airline industry [J].
DeVries, Peter D. .
INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2008, 6 (02) :151-164
[6]   RFID privacy: An overview of problems and proposed solutions [J].
Garfinkel, SL ;
Juels, A ;
Pappu, R .
IEEE SECURITY & PRIVACY, 2005, 3 (03) :34-43
[7]   Understanding the key success factors of RFID use in Supply Chain Management: a Delphi study [J].
Hung, Shin-Yuan ;
Chang, She-I ;
Ting, Chi-Ping .
INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2010, 8 (03) :313-333
[8]  
Hwang Min-Shiang, 2009, J COMPUTERS, V20
[9]   Robust and efficient authenticated key agreement in mobile communications [J].
Juang, Wen-Shenq ;
Wu, Jing-Lin .
INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2009, 7 (05) :562-579
[10]   RFID security and privacy: A research survey [J].
Juels, A .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :381-394