Method about the Authentication Process on the Air Interface of the Tag and the Reader in the Radio Frequency Identification System

Article Preview

Abstract:

As the development radio frequency identification, main researches are mainly focused on the information safety of the air interface, the communication protocol between the tag and the reader. If the air interface is not security, the information cannot be protected, bringing a serious threat to the system security. Although the physical based method can solve this problem in a certain extent, communication safety still cannot be satisfied. Therefore, in order to improve the information safety, this paper introduces a new method about how the tag and the reader authenticate each other. Experimental results show that the proposed method can improve the information security in the authentication process between the tag and the reader on the radio frequency identification system.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

359-363

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Weis S.A., Sarma S.E., Rivest R.L., Engels D.W. Security and privacy aspects of low-cost radio frequency identification systems, Proceedings of the 1st International Conference on Security in Pervasive Computing, Berlin: Springer-Verlag. 2004: 50-59.

DOI: 10.1007/978-3-540-39881-3_18

Google Scholar

[2] Weis S.A., Sarma S.E., Rivest R.L., Engels D.W. Security and privacy aspects of low-cost radio frequency identification systems, Proceedings of the 1st International Conference on Security in Pervasive Computing, Berlin: Springer-Verlag. 2004: 201-212.

DOI: 10.1007/978-3-540-39881-3_18

Google Scholar

[3] Ouyang CQ, Wu JX, Li ZY, Huang SY. An Enhanced Security Authentication Protocol Based on Hash-Lock for Low-cost RFID, The 2nd International Conference on Anti-counterfeiting, Security and Identification, 2008: 416-419.

DOI: 10.1109/iwasid.2008.4688440

Google Scholar

[4] Henrici D, Müller P. Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. Pervasive Computing and Communications Workshops, 2004: 149-153.

DOI: 10.1109/percomw.2004.1276922

Google Scholar

[5] Yang J, Park J, Lee H, Ren K, Kim K. Mutual Authentication Protocol for Low-cost RFID, Ecrypt Workshop on RFID and Lightweight Crypto, Graz, (2005).

Google Scholar

[6] ISO/IEC 18000-6C, [s], (2006).

Google Scholar