Security

Mobile RFID Mutual Authentication and Ownership Transfer

Download Now Free registration required

Executive Summary

In this paper, the authors propose an ownership transfer scheme of mobile RFID networks. The scheme includes a mutual authentication protocol and a role-based ownership transfer protocol. A tag will decide what operations are allowed for an authenticated reader according to the reader's role, and the back-end server will send the requested information about the tag to the reader. Keyed-hash functions are used to secure the protocols. They prove that their protocol can do against the threats of replay attacks, Distributed Denial of Service (DDoS), Man-In-The-Middle (MITM) attacks that change users' data, interception of data and location privacy, and tracking of tags' ownership transfer.

  • Format: PDF
  • Size: 1064.96 KB