{"title":"移动RFID网络中的认证协议","authors":"Ming-Hour Yang, Jia-Ning Luo","doi":"10.1109/ICONS.2009.9","DOIUrl":null,"url":null,"abstract":"In recent years the mobile RFID was developed due to its wide convenience by integrating the communication devices like PDA and mobile phone, it also directly applicable to the purchasing transaction or small amount payment. However, current RFID authentication schemes are not suitable to use in mobile RFID environment since the proposed authentication schemes result in computing load to the low cost tag and provide insufficient protection to the information privacy. Therefore, we propose a lightweight authentication protocol in mobile RFID and complied with EPC Class-1 Gen-2 norms, which effectively achieves forward security with preventing replay, Man-in-the-Middle (MITM), eavesdropping, and counterfeit tag attacks.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Authentication Protocol in Mobile RFID Network\",\"authors\":\"Ming-Hour Yang, Jia-Ning Luo\",\"doi\":\"10.1109/ICONS.2009.9\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years the mobile RFID was developed due to its wide convenience by integrating the communication devices like PDA and mobile phone, it also directly applicable to the purchasing transaction or small amount payment. However, current RFID authentication schemes are not suitable to use in mobile RFID environment since the proposed authentication schemes result in computing load to the low cost tag and provide insufficient protection to the information privacy. Therefore, we propose a lightweight authentication protocol in mobile RFID and complied with EPC Class-1 Gen-2 norms, which effectively achieves forward security with preventing replay, Man-in-the-Middle (MITM), eavesdropping, and counterfeit tag attacks.\",\"PeriodicalId\":270103,\"journal\":{\"name\":\"2009 Fourth International Conference on Systems\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Fourth International Conference on Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICONS.2009.9\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Fourth International Conference on Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICONS.2009.9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In recent years the mobile RFID was developed due to its wide convenience by integrating the communication devices like PDA and mobile phone, it also directly applicable to the purchasing transaction or small amount payment. However, current RFID authentication schemes are not suitable to use in mobile RFID environment since the proposed authentication schemes result in computing load to the low cost tag and provide insufficient protection to the information privacy. Therefore, we propose a lightweight authentication protocol in mobile RFID and complied with EPC Class-1 Gen-2 norms, which effectively achieves forward security with preventing replay, Man-in-the-Middle (MITM), eavesdropping, and counterfeit tag attacks.