Mutual Authentication Protocol for Mobile RFID Systems

Provided by: Binary Information Press
Topic: Security
Format: PDF
Recently, the mobile RFID-based applications become a new hot zone for research and development, because it has advantages of RFID technology and mobile smart device. However, mobile RFID system is facing all kinds of security and privacy threats because of its own features (e.g. the communication between a reader and a database is insecure). In this paper, the authors propose a mutual authentication protocol based on Elliptic Curve Cryptography (ECC) to address such severe problems. For avoiding exhaustive compute to authentication only one single tag, the proposed protocol requires that without secret does be shared by parties. The proposed protocol is designed to authenticate reader before tag authentication to avoid impersonation of a valid mobile reader.

Find By Topic