Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
RFID: Applications, Security, and Privacy
RFID: Applications, Security, and Privacy
A Feasible Security Mechanism for Low Cost RFID Tags
ICMB '05 Proceedings of the International Conference on Mobile Business
ICHIT '06 Proceedings of the 2006 International Conference on Hybrid Information Technology - Volume 02
New mutual agreement protocol to secure mobile RFID-enabled devices
Information Security Tech. Report
Mobile RFID applications and security challenges
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Hi-index | 0.00 |
The Mobile Radio Frequency Identification (M-RFID) system, defined as a special type of mobile service using RFID tag packaging object and RFID readers attached to mobile RFID terminals, has been studied actively in recent years. While the mobile RFID system has many advantages, the privacy violation problems at reader side, consumer tracking with malicious purpose and the sensitive information transmission problems among Tag, Reader and Server, are deeply concerned by individuals and scholars. Most of previous works utilize the principle of cryptography to solve these problems. Although the heart of any security schemes is the key management protocol responsible for the distribution of secret keys, as we know, few studies address this fundamental issue in the research of secure RFID. In this paper, we assume that all the communication channels among Tag, Reader, and Server are insecure. We propose a Trust-Third-Party based key management protocol to construct a secure session key among the tag, reader and server. The proposed protocol has the following four advantages: First, the communication between Reader and Server is anonymous, which provides the privacy of reader. Second, the dynamic tag identity can prevent the tag owner being tracked. Third, the secure session key construction among tag, reader and server can ensure the security of information transmission. Last, the system performance is ensured by the application of privacy-protectionpolicy based access control mechanism in the M-RFID system.