Mutual authentication protocol for RFID tags based on synchronized secret information with monitor

被引:0
作者
Han, Song [1 ]
Potdar, Vidyasagar [1 ]
Chang, Elizabeth [1 ]
机构
[1] Curtin Univ Technol, DEBII Inst, GPO Box U1987, Bentley, WA 6102, Australia
来源
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 3, PROCEEDINGS | 2007年 / 4707卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
RFID, as an anti-conterfeiting technology, is pushing huge potential industrial, medical, business and social applications. RFID-based identification is an example of emerging technology which requires authentication. In this paper, we will propose a new mutual authentication protocol for RFID tags. The RFID reader and tag will carry out the authentication based on their synchronized secret information. The synchronized secret information will be monitored by a component of the database server. Our protocol also supports the low-cost non-volatile memory of RFID tags. This is desirable since non-volatile memory is an expensive unit in RFID tags.
引用
收藏
页码:227 / +
页数:3
相关论文
共 16 条
[1]  
[Anonymous], MITAUTOIDWH014
[2]   A scalable and provably secure hash-based RFID protocol [J].
Avoine, G ;
Oechslin, P .
Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, :110-114
[3]  
AVOINE G, 2005, RFID TRACEABILITY MU
[4]  
CHOI EY, 2005, P INT WORKSH SEC UB
[5]  
Dimitriou T., 2005, INT C SEC PRIV EM AR
[6]  
FELDHOFER M, 2004, LNCS, V3156
[7]  
HENRICI D, 2004, WORKSH PERV COMP COM
[8]  
Juels A., 2005, LNCS, V3352
[9]  
JULES A, 2003, ACM C COMP COMM SEC, P103
[10]  
LEE S, 2006, WPHARDWARE032