Mobile RFID Mutual Authentication and Ownership Transfer

In this paper, the authors propose an ownership transfer scheme of mobile RFID networks. The scheme includes a mutual authentication protocol and a role-based ownership transfer protocol. A tag will decide what operations are allowed for an authenticated reader according to the reader's role, and the back-end server will send the requested information about the tag to the reader. Keyed-hash functions are used to secure the protocols. They prove that their protocol can do against the threats of replay attacks, Distributed Denial of Service (DDoS), Man-In-The-Middle (MITM) attacks that change users' data, interception of data and location privacy, and tracking of tags' ownership transfer.

Provided by: AICIT Topic: Security Date Added: Apr 2012 Format: PDF

Download Now

Find By Topic