Challenge-Response Based Secure RFID Authentication Protocol for Distributed Database Environment
نویسندگان
چکیده
منابع مشابه
Secure Improved Cloud-Based RFID Authentication Protocol
Although Radio Frequency IDentification (RFID) systems promise a fruitful future, security and privacy concerns have affected the adoption of the RFID technology. Several studies have been proposed to tackle the RFID security and privacy concerns under the assumption that the server is secure. In this paper, we assume that the server resides in the cloud that might be insecure, thus the tag’s d...
متن کاملSecure and Scalable RFID Authentication Protocol
The radio frequency identification (RFID) enables identifying an object remotely via radio waves. This feature has been used in a huge number of applications, reducing dramatically the costs in some production processes. Nonetheless, it also poses serious privacy and security risks to them. Thus, researchers have presented secure schemes that prevent attackers from misusing the information whic...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملA Secure and Efficient Authentication Protocol for Mobile RFID Systems
AbstrAct: The design of a secure communication scheme for Radio Frequency Identification (RFID) systems has been extensively studied in recent years in view of the awareness of individual privacy and the requirement of robust system security. Most of previous works assume the communication channel between an RFID reader and its backend server is secure and concentrate on the security enhancemen...
متن کاملA Secure Mutual Authentication Protocol for Low-cost RFID System
With extended data storage space and advanced wireless transmission capability, Radio Frequency IDentification (RFID) is rapidly deployed to replace barcode position in our daily lives and considered as the next generation identification technology in ubiquitous communication environment. The most important key factor of RFID technology is to enable systems with the ability to automatically ide...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The KIPS Transactions:PartC
سال: 2005
ISSN: 1598-2858
DOI: 10.3745/kipstc.2005.12c.3.309