A New RFID Authentication Protocol with Ownership Transfer in an Insecure Communication Environment
During recent years, RFID technology raises many privacy and security concerns. However, most previous works provided authentication protocols by the assumption of secure channel between the reader and the database. But this assumption is not suitable for wireless environment. In 2005, Yang et al. proposed a scheme in which the channel between the reader and the database is assumed to be insecure. Unfortunately, Yang et al.’s scheme cannot achieve some critical security requirements. Due to above reason, we propose a new authentication protocol against all possible attacks and this method is secure even if the channel between the reader and the database may suffer from the attacks of interception, eavesdropping and masquerade. Additionally, the proposed scheme also supports the ownership transfer property inspired by Osaka et al.’s and Lei-Cao’s schemes.
RFID Authentication Scheme Ownership Transfer Wireless Environment Network Security
Chih-Hung Wang Shan Chin
Dept. of Computer Science and Information Engineering National Chiayi University Chiayi, Taiwan, R.O.C
国际会议
2009 Ninth International Conference on Hybrid Intelligent Systems(第九届混合智能系统国际会议 HIS 2009)
沈阳
英文
1-6
2009-08-12(万方平台首次上网日期,不代表论文的发表时间)