{"title":"An RFID authentication protocol with flexible path authentication","authors":"D. Moriyama","doi":"10.1109/RFID-TA.2013.6694516","DOIUrl":null,"url":null,"abstract":"RFID technology enables us to identify many products with wireless communication. When RFID tags are attached to the various products for management, authorization to interact with the tag is changed in the life-cycle. In this paper, we propose the first RFID authentication protocol with flexible path authentication which the RFID reader and tag authenticate each other and the path can be verified by the current owner. We introduce a new security model for these protocols to prevent impersonation attacks and ensure the tag's privacy.","PeriodicalId":253369,"journal":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RFID-TA.2013.6694516","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
RFID technology enables us to identify many products with wireless communication. When RFID tags are attached to the various products for management, authorization to interact with the tag is changed in the life-cycle. In this paper, we propose the first RFID authentication protocol with flexible path authentication which the RFID reader and tag authenticate each other and the path can be verified by the current owner. We introduce a new security model for these protocols to prevent impersonation attacks and ensure the tag's privacy.