Anonymous mutual authentication protocol for RFID tag without back-end database
Access Status
Authors
Date
2007Type
Metadata
Show full item recordCitation
Source Title
ISBN
School
Remarks
The original publication is available at http://www.springerlink.com
Collection
Abstract
Abstract. RFID, as an emerging technology, has very huge potential in today's social and business developments. Security and Privacy are one of the important issues in the design of practical RFID protocols. In this paper, we focus on RFID authentication protocol. RFID mutual authentication is used to ensure that only an authorized RFID reader can access to the data of RFID tag while the RFID tag is confirmed that it releases data to the authenticated RFID reader. This paper will propose an anonymous mutual authentication protocol for RFID tag and reader. RFID tag is anonymous to RFID reader so that privacy can be preserved. In addition, mutual authentication does not need to rely on a back-end database.
Related items
Showing items related by title, author, creator and subject.
-
Han, Song; Dillon, Tharam S.; Potdar, Vidyasagar; Chang, Elizabeth (2013)RFID has very huge potential in today's social and business developments. RFID-based identification is an example of emerging technology which requires authentication Security and Privacy are one of the important issues ...
-
Han, Song; Potdar, Vidyasagar; Chang, Elizabeth (2007)RFID, as an anti-conterfeiting technology, is pushing huge potential industrial, medical, business and social applications. RFID-based identification is an example of emerging technology which requires authentication. In ...
-
Potdar, Vidyasagar; Wu, Chen; Chang, Elizabeth (2007)In this chapter we provide an introduction to RFID technology. We discuss the main components of the RFID technology, which includes RFID transponders, RFID readers, RFID middleware, and RFID labels. A detailed classification ...