{"title":"An efficient delegation protocol in mobile RFID networks","authors":"Jia-Ning Luo, Ming-Hour Yang","doi":"10.1109/ISIC.2012.6449731","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a new protocol to allow delegation transfer between offline mobile readers in the mobile RFID (Radio Frequency Identification) environment. A mobile reader can grant the access rights of a specific tag from another reader. Besides, our protocol is efficient and secure against most current network threats, such as replay attacks, Man-in-the-Middle (MITM) attacks, denial of service (DoS) attacks caused by asynchronous update, guessing attacks, and counterfeit tags. It also guarantees forward/backward secrecy, data privacy, and location privacy.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"26 3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Information Security and Intelligent Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIC.2012.6449731","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper, we propose a new protocol to allow delegation transfer between offline mobile readers in the mobile RFID (Radio Frequency Identification) environment. A mobile reader can grant the access rights of a specific tag from another reader. Besides, our protocol is efficient and secure against most current network threats, such as replay attacks, Man-in-the-Middle (MITM) attacks, denial of service (DoS) attacks caused by asynchronous update, guessing attacks, and counterfeit tags. It also guarantees forward/backward secrecy, data privacy, and location privacy.