Download now Free registration required
In this paper, the authors propose an ownership transfer scheme of mobile RFID networks. The scheme includes a mutual authentication protocol and a role-based ownership transfer protocol. A tag will decide what operations are allowed for an authenticated reader according to the reader's role, and the back-end server will send the requested information about the tag to the reader. Keyed-hash functions are used to secure the protocols. They prove that their protocol can do against the threats of replay attacks, Distributed Denial of Service (DDoS), Man-In-The-Middle (MITM) attacks that change users' data, interception of data and location privacy, and tracking of tags' ownership transfer.
- Format: PDF
- Size: 1064.96 KB