{"title":"具有柔性路径认证的RFID认证协议","authors":"D. Moriyama","doi":"10.1109/RFID-TA.2013.6694516","DOIUrl":null,"url":null,"abstract":"RFID technology enables us to identify many products with wireless communication. When RFID tags are attached to the various products for management, authorization to interact with the tag is changed in the life-cycle. In this paper, we propose the first RFID authentication protocol with flexible path authentication which the RFID reader and tag authenticate each other and the path can be verified by the current owner. We introduce a new security model for these protocols to prevent impersonation attacks and ensure the tag's privacy.","PeriodicalId":253369,"journal":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An RFID authentication protocol with flexible path authentication\",\"authors\":\"D. Moriyama\",\"doi\":\"10.1109/RFID-TA.2013.6694516\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"RFID technology enables us to identify many products with wireless communication. When RFID tags are attached to the various products for management, authorization to interact with the tag is changed in the life-cycle. In this paper, we propose the first RFID authentication protocol with flexible path authentication which the RFID reader and tag authenticate each other and the path can be verified by the current owner. We introduce a new security model for these protocols to prevent impersonation attacks and ensure the tag's privacy.\",\"PeriodicalId\":253369,\"journal\":{\"name\":\"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RFID-TA.2013.6694516\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RFID-TA.2013.6694516","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An RFID authentication protocol with flexible path authentication
RFID technology enables us to identify many products with wireless communication. When RFID tags are attached to the various products for management, authorization to interact with the tag is changed in the life-cycle. In this paper, we propose the first RFID authentication protocol with flexible path authentication which the RFID reader and tag authenticate each other and the path can be verified by the current owner. We introduce a new security model for these protocols to prevent impersonation attacks and ensure the tag's privacy.