Mutual authentication protocol for RFID tags based on synchronised secret information with monitor
MetadataShow full item record
RFID, as an anti-conterfeiting technology, is pushing huge potential industrial, medical, business and social applications. RFID-based identification is an example of emerging technology which requires authentication. In this paper, we will propose a new mutual authentication protocol for RFID tags. The RFID reader and tag will carry out the authentication based on their syn-chronized secret information. The synchronized secret information will be monitored by a component of the database server. Our protocol also supports the low-cost non-volatile memory of RFID tags. This is desirable since non-volatile memory is an expensive unit in RFID tags.
Showing items related by title, author, creator and subject.
Han, Song; Dillon, Tharam S.; Potdar, Vidyasagar; Chang, Elizabeth (2013)RFID has very huge potential in today's social and business developments. RFID-based identification is an example of emerging technology which requires authentication Security and Privacy are one of the important issues ...
Han, Song; Dillon, Tharam S.; Chang, Elizabeth (2007)Abstract. RFID, as an emerging technology, has very huge potential in today's social and business developments. Security and Privacy are one of the important issues in the design of practical RFID protocols. In this paper, ...
Mohan, M.; Potdar, Vidyasagar; Chang, Elizabeth (2006)Security is one major issue with RFID technology. Mainstream research in RFID security addresses the following security properties i.e. anonymity, confidentiality and authenticity, however it does not cater for integrity. ...