Abstract
RFID, as an emerging technology, has very huge potential in today’s social and business developments. Security and Privacy are one of the important issues in the design of practical RFID protocols. In this paper, we focus on RFID authentication protocol. RFID mutual authentication is used to ensure that only an authorized RFID reader can access to the data of RFID tag while the RFID tag is confirmed that it releases data to the authenticated RFID reader. This paper will propose an anonymous mutual authentication protocol for RFID tag and reader. RFID tag is anonymous to RFID reader so that privacy can be preserved. In addition, mutual authentication does not need to rely on a back-end database.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Rieback, M.R., Crispo, B., Tanenbaum, A.S.: The evolution of RFID security. IEEE Pervasive Computing, 62–69 (January - March 2006)
Greenfield, A.: Everyware: The Dawning Age of Ubiquitous Computing. Peachpit Press, Berkeley, CA (2006)
Kaps, J.P., Gaubatz, G., Sunar, B.: Cryptography on a speck of dust. IEEE Computer, 38–44 (February 2007)
Henrici, D., Muller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In: Proceedings of Workshop on Pervasive Computing and Communications Security (2004)
Molnar, D., Wagner, D.: Privacy and Security in Library RFID Issues, Practices, and Architectures. ACM Conference on Computer and Communication Security (2004)
Sarma, S.E., Weis, S.A., Engels, D.W.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–470. Springer, Heidelberg (2003)
Sean, W., Thomas, L.: Automatic identification and data collection technologies in the transportation industry: Barcode and RFID. Technical Report (2001)
Han, S., Potdar, V., Chang, E.: Mutual authentication protocol for RFID tags based on synchronized secret information with monitor. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007. LNCS, vol. 4707, pp. 227–238. Springer, Heidelberg (2007)
Dimitriou, T.: A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks. International Conference on Security and Privacy for Emerging Areas in Communication Networks- SecComm (September 2005)
Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash Based RFID Protocol. In: The 2nd IEEE International Workshop on Pervasive Computing and Communication Security, Kauai Island, Hawaii, USA, pp. 110–114 (March 8, 2005)
Lee, S.M., Hwang, Y.J., Lee, D.H., Lim, J.I.: Efficient Authentication for Low-Cost RFID Systems. In: International Conference on Computational Science and Its Applications - ICCSA, pp. 619–627 (May 2005)
Tan, C.C., Sheng, B., Li, Q.: Serverless Search and Authentication protocols for RFID. In: Proceedings of Pervasive Computing Conference (2006)
Peris-Lopez, P., Castro, J.C.H., Estevez-Tapiador, J.M., Ribagorda, A.: EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. In: OTM Workshops (1), pp. 352–361 (2006)
Wal-Mart Details RFID Requirement (November 6, 2003), Article appears in http://www.rfidjournal.com/article/articleview/642/1/1/
Advanced Barcode Technology, http://bar-codes.com/
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Han, S., Dillon, T.S., Chang, E. (2007). Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database. In: Zhang, H., Olariu, S., Cao, J., Johnson, D.B. (eds) Mobile Ad-Hoc and Sensor Networks. MSN 2007. Lecture Notes in Computer Science, vol 4864. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77024-4_57
Download citation
DOI: https://doi.org/10.1007/978-3-540-77024-4_57
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77023-7
Online ISBN: 978-3-540-77024-4
eBook Packages: Computer ScienceComputer Science (R0)