RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
RFID: A Technical Overview and Its Application to the Enterprise
IT Professional
RFID security without extensive cryptography
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Mobile RFID Technology for Improving M-Commerce
ICEBE '05 Proceedings of the IEEE International Conference on e-Business Engineering
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Computer Standards & Interfaces
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
Computer Standards & Interfaces
Engineering Applications of Artificial Intelligence
WIPI mobile platform with secure service for mobile RFID network environment
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Hi-index | 0.00 |
In this paper, we propose a novel scheme conforming to EPC C1G2 standards with low implementation cost. Benefit from reducing the manpower of market management, the market members can use the mobile reader to query products information and make a secure transaction through cash register efficiently. The membership holders can also use the accumulated digital coupons to redeem prizes with the server. Moreover, in order to achieve the mutual authentication, the proposed scheme integrates the fingerprint biometrics, related cryptology and hash function mechanism to ensure the security of the transmission messages. It is also beneficial to M-commerce and can resist known attacks.