An authentication protocol in mobile RFID environment

被引:0
作者
Sun, Hung-Min [1 ]
Lu, Chen-En [2 ]
Chen, Shuai-Min [1 ]
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Tsing Hua Univ, Inst Informat Syst Applicat, Hsinchu, Taiwan
来源
TENCON 2007 - 2007 IEEE REGION 10 CONFERENCE, VOLS 1-3 | 2007年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
RFIDs have been popularly used in daily life. To avoid being intruded on user privacy, proper protection is necessary. The privacy issues, such as object tracking and forgery of tags, are widely studied in the literature. Traditionally, the reader is regarded as a part of the system. In mobile RFID environment, however, anyone who holds the reader can connect to the server and acquire other information about the objects he owns. To verify whether a reader has the rights to access the tags has become essential. In this paper, we propose an RFID authentication protocol that can achieve the above goal and provide tag anonymity and forgery resistance. Hence, the user privacy is guaranteed.
引用
收藏
页码:1143 / +
页数:2
相关论文
共 14 条
[1]  
Auto-ID Center, 2002, MITAUTOIDTR007
[2]  
DIMITRIOU T, 2005, C SEC PRIV EM AR COM
[3]  
Feldhofer M, 2004, LECT NOTES COMPUT SC, V3156, P357
[4]  
Golle P, 2004, LECT NOTES COMPUT SC, V2964, P163
[5]  
Henrici D, 2004, SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, P149
[6]  
Juels A, 2005, LECT NOTES COMPUT SC, V3352, P149
[7]  
Juels A., 2003, Proc. ACM Conf. Computer and Communications Security, P103, DOI DOI 10.1145/948109.948126
[8]  
KIM J, 2006, WIR PERV COMP 2006 1
[9]  
MOLNAR D, 2004, ACM C COMP COMM SEC, P210
[10]  
MOLNAR D, 2005, SELECTEDAREAS CRYPTO