The design of RFID access control protocol using the strategy of indefinite-index and challenge-response

被引:16
作者
Chen, Yu-Yi [1 ]
Tsai, Meng-Lin [2 ]
Jan, Jinn-Ke [2 ]
机构
[1] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 402, Taiwan
[2] Natl Chung Hsing Univ, Dept Comp Sci & Engn, Taichung 402, Taiwan
关键词
RFID; Access control; Authentication; Authorization; Security; SECURITY;
D O I
10.1016/j.comcom.2010.05.012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a Radio Frequency Identification (RFID) access control scheme, which includes not only an authentication mechanism, but also an access right authorization mechanism designed for a low-cost RFID system. The scheme guarantees mutual authentication and location privacy and also resists the man-in-the-middle attack, the spoofed reader attack, and the spoofed tag attack. Our scheme is more suitable for meeting future RFID system demands. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:250 / 256
页数:7
相关论文
共 8 条
[1]   A scalable and provably secure hash-based RFID protocol [J].
Avoine, G ;
Oechslin, P .
Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, :110-114
[2]  
Chien HungY., 2006, Proceedings-ieee international conference on mobile data management, V2006, P96
[3]  
DIMITRIOU T, 2005, C SEC PRIV EM AR COM
[4]   A Security-provable Authentication and Key Agreement Protocol in RFID System [J].
He Lei ;
Gan Yong ;
Li Na-Na ;
Cai Zeng-Yu .
2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, :2078-2080
[5]  
Lee SM, 2005, LECT NOTES COMPUT SC, V3480, P619
[6]  
WEIS S, 2003, 1 INT C SEC PERV COM
[7]   Security and privacy in RFID and applications in telemedicine [J].
Xiao, Y ;
Shen, XM ;
Sun, B ;
Cai, L .
IEEE COMMUNICATIONS MAGAZINE, 2006, 44 (04) :64-72
[8]  
YANG J, 2005, THESIS INFORMATION C