Paper Title:
A Security Authentication Method of Mobile RFID
  Abstract

As the internet technology develops, the application of mobile RFID becomes more and more common. Since mobile RFID label is easier to be read and attacked by hacker, personal information of the users is leaked. Present authentication mechanisms in application are either made into RFID hardware with complex design or with weaker security protection ability. The paper proposes a new security authentication mechanism and the test result shows that the authentication mechanism may effectively prevent various attack behaviors of hack with the base of low cost so as to reach the objective of protecting personal privacy of card holder.

  Info
Periodical
Advanced Materials Research (Volumes 268-270)
Edited by
Feng Xiong
Pages
1077-1081
DOI
10.4028/www.scientific.net/AMR.268-270.1077
Citation
S. D. Bao, "A Security Authentication Method of Mobile RFID", Advanced Materials Research, Vols. 268-270, pp. 1077-1081, 2011
Online since
July 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Yong Gan, Lei He, Tao Zhang, Na Na Li
Abstract:RFID has become an important infrastructure technology. However, it does not solve information security problem. An adversary can eavesdrop...
2262
Authors: Lei He, Yong Gan, Na Na Li, Tao Zhang
Abstract:Information security problem has become one of the hottest issues in RFID system. More and more researchers begin to study how to provide...
2267
Authors: Yu Min Xie
Abstract:User authentication is a key research domain in security. A user authentication scheme based on Physical Unclonable Function (PUF) is...
561
Authors: Lin Tang, En Jian Bai, Wen Qiang Wu
Chapter 8: Nanomaterials and Nanomanufacturing
Abstract:With the development of e-business market, radio frequency identification (RFID) technology is becoming more and more importance. It is often...
1845
Authors: Yun Seok Lee, Eun Kim, Sung Jin Kim, Min Soo Jung
Chapter 13: Internet and E-Commerce Technology
Abstract:Today, users can access in the network environments anywhere and anytime through a mobile devices. These environments also can be able to...
2785