Skip to main content

Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database

  • Conference paper
Mobile Ad-Hoc and Sensor Networks (MSN 2007)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4864))

Included in the following conference series:

Abstract

RFID, as an emerging technology, has very huge potential in today’s social and business developments. Security and Privacy are one of the important issues in the design of practical RFID protocols. In this paper, we focus on RFID authentication protocol. RFID mutual authentication is used to ensure that only an authorized RFID reader can access to the data of RFID tag while the RFID tag is confirmed that it releases data to the authenticated RFID reader. This paper will propose an anonymous mutual authentication protocol for RFID tag and reader. RFID tag is anonymous to RFID reader so that privacy can be preserved. In addition, mutual authentication does not need to rely on a back-end database.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Rieback, M.R., Crispo, B., Tanenbaum, A.S.: The evolution of RFID security. IEEE Pervasive Computing, 62–69 (January - March 2006)

    Google Scholar 

  2. Greenfield, A.: Everyware: The Dawning Age of Ubiquitous Computing. Peachpit Press, Berkeley, CA (2006)

    Google Scholar 

  3. Kaps, J.P., Gaubatz, G., Sunar, B.: Cryptography on a speck of dust. IEEE Computer, 38–44 (February 2007)

    Google Scholar 

  4. Henrici, D., Muller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In: Proceedings of Workshop on Pervasive Computing and Communications Security (2004)

    Google Scholar 

  5. Molnar, D., Wagner, D.: Privacy and Security in Library RFID Issues, Practices, and Architectures. ACM Conference on Computer and Communication Security (2004)

    Google Scholar 

  6. Sarma, S.E., Weis, S.A., Engels, D.W.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–470. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  7. Sean, W., Thomas, L.: Automatic identification and data collection technologies in the transportation industry: Barcode and RFID. Technical Report (2001)

    Google Scholar 

  8. Han, S., Potdar, V., Chang, E.: Mutual authentication protocol for RFID tags based on synchronized secret information with monitor. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007. LNCS, vol. 4707, pp. 227–238. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  9. Dimitriou, T.: A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks. International Conference on Security and Privacy for Emerging Areas in Communication Networks- SecComm (September 2005)

    Google Scholar 

  10. Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash Based RFID Protocol. In: The 2nd IEEE International Workshop on Pervasive Computing and Communication Security, Kauai Island, Hawaii, USA, pp. 110–114 (March 8, 2005)

    Google Scholar 

  11. Lee, S.M., Hwang, Y.J., Lee, D.H., Lim, J.I.: Efficient Authentication for Low-Cost RFID Systems. In: International Conference on Computational Science and Its Applications - ICCSA, pp. 619–627 (May 2005)

    Google Scholar 

  12. Tan, C.C., Sheng, B., Li, Q.: Serverless Search and Authentication protocols for RFID. In: Proceedings of Pervasive Computing Conference (2006)

    Google Scholar 

  13. Peris-Lopez, P., Castro, J.C.H., Estevez-Tapiador, J.M., Ribagorda, A.: EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. In: OTM Workshops (1), pp. 352–361 (2006)

    Google Scholar 

  14. Wal-Mart Details RFID Requirement (November 6, 2003), Article appears in http://www.rfidjournal.com/article/articleview/642/1/1/

  15. Advanced Barcode Technology, http://bar-codes.com/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hongke Zhang Stephan Olariu Jiannong Cao David B. Johnson

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Han, S., Dillon, T.S., Chang, E. (2007). Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database. In: Zhang, H., Olariu, S., Cao, J., Johnson, D.B. (eds) Mobile Ad-Hoc and Sensor Networks. MSN 2007. Lecture Notes in Computer Science, vol 4864. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77024-4_57

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77024-4_57

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77023-7

  • Online ISBN: 978-3-540-77024-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics