Curtin University Homepage
  • Library
  • Help
    • Admin

    espace - Curtin’s institutional repository

    JavaScript is disabled for your browser. Some features of this site may not work without it.
    View Item 
    • espace Home
    • espace
    • Curtin Research Publications
    • View Item
    • espace Home
    • espace
    • Curtin Research Publications
    • View Item

    RFID mutual authentication protocols for tags and readers with and without a server

    Access Status
    Fulltext not available
    Authors
    Han, Song
    Dillon, Tharam S.
    Potdar, Vidyasagar
    Chang, Elizabeth
    Date
    2013
    Type
    Journal Article
    
    Metadata
    Show full item record
    Citation
    Han, S. and Dillon, T.S. and Potdar, V. and Chang, E. 2013. RFID mutual authentication protocols for tags and readers with and without a server. Computer Systems Science and Engineering. 28 (2): pp. 91-99.
    Source Title
    Computer Systems Science and Engineering
    ISSN
    0267-6192
    School
    School of Information Systems
    URI
    http://hdl.handle.net/20.500.11937/64419
    Collection
    • Curtin Research Publications
    Abstract

    RFID has very huge potential in today's social and business developments. RFID-based identification is an example of emerging technology which requires authentication Security and Privacy are one of the important issues in the design of practical RFID protocols. In this paper, we focus on RFID authentication protocol RFID mutual authentication is used to ensure that only an authorized RFID reader can access the data of RFID tag while the RFID tag is confirmed that it releases data to the authenticated RFID reader. In this paper, we will propose two mutual authentication protocols for RFID tags: server-based authentication protocol and serverless authentication protocol. The two protocols both enable RFID reader and tag to carry out the authentication based on their synchronized secret information. In the first protocol based on a server, the synchronized secret information will be monitored by a component of the database server. In the second protocol without a server, mutual authentication does not need to rely on a back-end database. It enables RFID tags to be anonymous to RFID reader so that privacy can be preserved. © 2013 CRL Publishing Ltd.

    Related items

    Showing items related by title, author, creator and subject.

    • Mutual authentication protocol for RFID tags based on synchronised secret information with monitor
      Han, Song; Potdar, Vidyasagar; Chang, Elizabeth (2007)
      RFID, as an anti-conterfeiting technology, is pushing huge potential industrial, medical, business and social applications. RFID-based identification is an example of emerging technology which requires authentication. In ...
    • Anonymous mutual authentication protocol for RFID tag without back-end database
      Han, Song; Dillon, Tharam S.; Chang, Elizabeth (2007)
      Abstract. RFID, as an emerging technology, has very huge potential in today's social and business developments. Security and Privacy are one of the important issues in the design of practical RFID protocols. In this paper, ...
    • Privacy-preserving transactions protocol using mobile agents with mutual authentication
      Han, Song; Potdar, Vidyasagar; Chang, Elizabeth; Dillon, Tharam S. (2007)
      This article introduces a new transaction protocol using mobile agents in electronic commerce. The authors first propose a new model for transactions in electronic commerce mutual authenticated transactions using mobile ...
    Advanced search

    Browse

    Communities & CollectionsIssue DateAuthorTitleSubjectDocument TypeThis CollectionIssue DateAuthorTitleSubjectDocument Type

    My Account

    Admin

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    Follow Curtin

    • 
    • 
    • 
    • 
    • 

    CRICOS Provider Code: 00301JABN: 99 143 842 569TEQSA: PRV12158

    Copyright | Disclaimer | Privacy statement | Accessibility

    Curtin would like to pay respect to the Aboriginal and Torres Strait Islander members of our community by acknowledging the traditional owners of the land on which the Perth campus is located, the Whadjuk people of the Nyungar Nation; and on our Kalgoorlie campus, the Wongutha people of the North-Eastern Goldfields.