{"title":"Authentication Protocol in Mobile RFID Network","authors":"Ming-Hour Yang, Jia-Ning Luo","doi":"10.1109/ICONS.2009.9","DOIUrl":null,"url":null,"abstract":"In recent years the mobile RFID was developed due to its wide convenience by integrating the communication devices like PDA and mobile phone, it also directly applicable to the purchasing transaction or small amount payment. However, current RFID authentication schemes are not suitable to use in mobile RFID environment since the proposed authentication schemes result in computing load to the low cost tag and provide insufficient protection to the information privacy. Therefore, we propose a lightweight authentication protocol in mobile RFID and complied with EPC Class-1 Gen-2 norms, which effectively achieves forward security with preventing replay, Man-in-the-Middle (MITM), eavesdropping, and counterfeit tag attacks.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Fourth International Conference on Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICONS.2009.9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
In recent years the mobile RFID was developed due to its wide convenience by integrating the communication devices like PDA and mobile phone, it also directly applicable to the purchasing transaction or small amount payment. However, current RFID authentication schemes are not suitable to use in mobile RFID environment since the proposed authentication schemes result in computing load to the low cost tag and provide insufficient protection to the information privacy. Therefore, we propose a lightweight authentication protocol in mobile RFID and complied with EPC Class-1 Gen-2 norms, which effectively achieves forward security with preventing replay, Man-in-the-Middle (MITM), eavesdropping, and counterfeit tag attacks.