Mutual authentication protocol for RFID tags based on synchronised secret information with monitor
MetadataShow full item record
RFID, as an anti-conterfeiting technology, is pushing huge potential industrial, medical, business and social applications. RFID-based identification is an example of emerging technology which requires authentication. In this paper, we will propose a new mutual authentication protocol for RFID tags. The RFID reader and tag will carry out the authentication based on their syn-chronized secret information. The synchronized secret information will be monitored by a component of the database server. Our protocol also supports the low-cost non-volatile memory of RFID tags. This is desirable since non-volatile memory is an expensive unit in RFID tags.
The original publication is available at http://www.springerlink.com
The link to this article is:
Showing items related by title, author, creator and subject.
Han, Song; Dillon, Tharam S.; Chang, Elizabeth (2007)Abstract. RFID, as an emerging technology, has very huge potential in today's social and business developments. Security and Privacy are one of the important issues in the design of practical RFID protocols. In this paper, ...
Mohan, M.; Potdar, Vidyasagar; Chang, Elizabeth (2006)Security is one major issue with RFID technology. Mainstream research in RFID security addresses the following security properties i.e. anonymity, confidentiality and authenticity, however it does not cater for integrity. ...
Yousuf, Y.; Potdar, Vidyasagar (2008)RFID are small wireless devices which can be used for identification of objects and humans as well. Their acceptance has grown in past years and is expected to grow further. Due to reduction in cost of production RFID ...