A Security Authentication Method of Mobile RFID

Article Preview

Abstract:

As the internet technology develops, the application of mobile RFID becomes more and more common. Since mobile RFID label is easier to be read and attacked by hacker, personal information of the users is leaked. Present authentication mechanisms in application are either made into RFID hardware with complex design or with weaker security protection ability. The paper proposes a new security authentication mechanism and the test result shows that the authentication mechanism may effectively prevent various attack behaviors of hack with the base of low cost so as to reach the objective of protecting personal privacy of card holder.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 268-270)

Pages:

1077-1081

Citation:

Online since:

July 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] EPCglobal Inc, http: /www. epcglobalinc. org/home.

Google Scholar

[2] EPCglobal. EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz Version 1. 1. 0, EPCglobal Inc. (2007).

Google Scholar

[3] Shingo Kinoshita, fumitaka Hoshino, tomoyuki Komuro, Akiko Fujimura, Miyako Ohkubo. Non-identfifiable Anonymous-ID Scheme for RFID Privacy Protection, Computer Security Symposium 2003(CSS2003), (2003).

Google Scholar

[4] Ari Juels, Ravikanth Pappu. Squealing Euros: Privacy Protection in RFID-Enabled Banknotes, Financial Cryptography'03, (2003).

DOI: 10.1007/978-3-540-45126-6_8

Google Scholar

[5] Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, Daniel W. Engels. Security and Privacy Aspects Low-Cost Radio Frequency Identification Systems, LNCS, Vol 2802, pp.201-212,(2003).

DOI: 10.1007/978-3-540-39881-3_18

Google Scholar

[6] Miyako Ohkubo, Koutarou Suzuki, Shingo Kinoshita. Cryptographic Approach to Privacy-Friendly Tags, RFID Privacy WorkShop, (2003).

Google Scholar

[7] Tassos dimitriou. A Lightweight RFID Protocol to protect against Traceability and Cloning attacks, conference on Security and Privacy for Emerging Areas in Communication Networks, (2005).

DOI: 10.1109/securecomm.2005.4

Google Scholar

[8] Ari Juels. Strengthening EPC Tag Against cloning, Proceedings of the 4th ACM workshop on Wireless security, pp.67-76.

DOI: 10.1145/1080793.1080805

Google Scholar