SURVEY AND REMEDY OF MUTUAL AUTHENTICATION PROTOCOLS FOR RFID SYSTEM
Although several mutual authentication protocols which use a back-end server to retrieve a tags data have been proposed in RFID systems, many of them do not take the resources of back-end server into consideration. They use sequential search in database to carry out the authentication process. In this paper, we survey the existing mutual authentication protocols for RFID systems and propose some remedies for these protocols especially with a special focus on the sequential search problem. After they are remedied, these protocols not only keep their properties such as anonymity and privacy but also increase the performance on the database search in the back-end server.
RFID Security and privacy Authentication protocol Scalability
ALBERT JENG LI-CHUNG CHANG HUANG-KUAN HO
Department of Computer Science and Information Engineering, Jinwen University of Science and Technol Department of Electrical Engineering, National Taiwan University of Science and Technology, Taipei,
国际会议
2008 International Conference on Machine Learning and Cybernetics(2008机器学习与控制论国际会议)
昆明
英文
3361-3366
2008-07-12(万方平台首次上网日期,不代表论文的发表时间)