Privacy threats and issues in mobile RFID
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
rfidDOT: RFID delegation and ownership transfer made simple
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Authentication Protocol in Mobile RFID Network
ICONS '09 Proceedings of the 2009 Fourth International Conference on Systems
Self-Updating hash chains and their implementations
WISE'06 Proceedings of the 7th international conference on Web Information Systems
Across-authority lightweight ownership transfer protocol
Electronic Commerce Research and Applications
Hi-index | 0.00 |
To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS) attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.