RFID mutual authentication protocols for tags and readers with and without a server
dc.contributor.author | Han, Song | |
dc.contributor.author | Dillon, Tharam S. | |
dc.contributor.author | Potdar, Vidyasagar | |
dc.contributor.author | Chang, Elizabeth | |
dc.date.accessioned | 2018-02-06T10:00:41Z | |
dc.date.available | 2018-02-06T10:00:41Z | |
dc.date.created | 2018-02-06T09:25:13Z | |
dc.date.issued | 2013 | |
dc.identifier.citation | Han, S. and Dillon, T.S. and Potdar, V. and Chang, E. 2013. RFID mutual authentication protocols for tags and readers with and without a server. Computer Systems Science and Engineering. 28 (2): pp. 91-99. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/64419 | |
dc.description.abstract |
RFID has very huge potential in today's social and business developments. RFID-based identification is an example of emerging technology which requires authentication Security and Privacy are one of the important issues in the design of practical RFID protocols. In this paper, we focus on RFID authentication protocol RFID mutual authentication is used to ensure that only an authorized RFID reader can access the data of RFID tag while the RFID tag is confirmed that it releases data to the authenticated RFID reader. In this paper, we will propose two mutual authentication protocols for RFID tags: server-based authentication protocol and serverless authentication protocol. The two protocols both enable RFID reader and tag to carry out the authentication based on their synchronized secret information. In the first protocol based on a server, the synchronized secret information will be monitored by a component of the database server. In the second protocol without a server, mutual authentication does not need to rely on a back-end database. It enables RFID tags to be anonymous to RFID reader so that privacy can be preserved. © 2013 CRL Publishing Ltd. | |
dc.publisher | C R L Publishing Ltd. | |
dc.title | RFID mutual authentication protocols for tags and readers with and without a server | |
dc.type | Journal Article | |
dcterms.source.volume | 28 | |
dcterms.source.number | 2 | |
dcterms.source.startPage | 91 | |
dcterms.source.endPage | 99 | |
dcterms.source.issn | 0267-6192 | |
dcterms.source.title | Computer Systems Science and Engineering | |
curtin.department | School of Information Systems | |
curtin.accessStatus | Fulltext not available |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |