Authentication with low-cost RFID tags in mobile networks

被引:2
|
作者
Yen, Chih-Ta [1 ]
Guo, Ming-Huang [2 ]
Lo, Nai-Wei [1 ]
Deng, Der-Jiunn [3 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan
[2] Shih Hsin Univ, Dept Informat Management, Taipei, Taiwan
[3] Natl Changhua Univ Educ, Dept Comp Sci & Informat Engn, Changhua, Taiwan
关键词
radio frequency identification; third generation; authentication;
D O I
10.1002/sec.667
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
<title content-type="main">ABSTRACT Recently, mobile networks and radio frequency identification (RFID) technologies are both widely applied by many enterprises to develop their applications. The third-generation (3G) mobile network technology is one of the popular mobile network technologies because service providers can serve users anytime and anywhere through 3G mobile network technology. A solution that combines RFID technology with 3G mobile network technology could identify users anytime and anywhere. However, RFID tags are limited in computation power and suffered from security threats, especially on mobile networks. An authentication with low-cost RFID tags in Mobile Networks should be proposed in this paper. This paper designs a key agreement mechanism to achieve consistency, integration, legality, and safety. In order to design a low-cost scheme, our authentication mechanism is built of simple XOR operations and one-way hash function. Although the computation cost of our proposed mechanism is not the best, our proposed mechanism can achieve more security requirements for practical applications. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:1021 / 1027
页数:7
相关论文
共 50 条
  • [1] RFID Authentication Protocol for Low-cost RFID Tags
    Kang, BooJoong
    Kim, Hye Seon
    Kim, Eui-Hyung
    Kim, Hyong-Shik
    Im, Eul Gyu
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (06): : 2041 - 2060
  • [2] An authentication protocol for low-cost RFID tags
    Wei, Chia-Hui
    Hwang, Min-Shiang
    Chin, Augustin Yeh-Hao
    INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2011, 9 (02) : 208 - 223
  • [3] RFID Authentication Protocol for Low-cost Tags
    Song, Boyeon
    Mitchell, Chris J.
    WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 140 - 147
  • [4] An Efficient RFID Authentication Protocol for Low-cost Tags
    Liu, Yanfei
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 180 - 185
  • [5] A Novel RFID Authentication Protocol for Low-Cost Tags
    Wu, Dan
    Chen, Geng
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 43 - 46
  • [6] Quantitative Analysis for Authentication of Low-cost RFID Tags
    Paparrizos, Ioannis
    Basagiannis, Stylianos
    Petridou, Sophia
    2011 IEEE 36TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2011, : 295 - 298
  • [7] Ultralightweight RFID Authentication Protocols for Low-Cost Passive RFID Tags
    Khalid, Madiha
    Mujahid, Umar
    Muhammad, Najam-ul-Islam
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [8] Two Ultralightweight Authentication Protocols for Low-Cost RFID Tags
    Lee, Yung-Cheng
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (02): : 425S - 431S
  • [9] Employing Lightweight Primitives on Low-cost RFID Tags for Authentication
    Li, Tieyan
    68TH IEEE VEHICULAR TECHNOLOGY CONFERENCE, FALL 2008, 2008, : 1357 - 1361
  • [10] A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
    Abughazalah, Sarah
    Markantonakis, Konstantinos
    Mayes, Keith
    SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2013, 405 : 102 - 110