RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
RFID: A Technical Overview and Its Application to the Enterprise
IT Professional
RFID security without extensive cryptography
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Mobile RFID Technology for Improving M-Commerce
ICEBE '05 Proceedings of the IEEE International Conference on e-Business Engineering
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Computer Standards & Interfaces
Privacy preserving multi-factor authentication with biometrics
Journal of Computer Security - The Second ACM Workshop on Digital Identity Management - DIM 2006
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
Computer Standards & Interfaces
A multimodal technique for an embedded fingerprint recognizer in mobile payment systems
Mobile Information Systems - Advances in Mobile Communications and Computing
Engineering Applications of Artificial Intelligence
Using mobile devices to support online collaborative learning
Mobile Information Systems - Mobile and Wireless Networks
RFID-based human behavior modeling and anomaly detection for elderly care
Mobile Information Systems
WIPI mobile platform with secure service for mobile RFID network environment
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Emerging Wireless and Mobile Technologies
Mobile Information Systems - Emerging Wireless and Mobile Technologies
A methodology to counter DoS attacks in mobile IP communication
Mobile Information Systems
Detection of cross site scripting attack in wireless networks using n-Gram and SVM
Mobile Information Systems - Advances in Network-Based Information Systems
Hi-index | 0.00 |
In recent years, as RFID reader equipment is ever more widely deployed in handled devices, the importance of security problems among RFID reader, tags and server have obviously gained increased attention. However, there are still many security issues preceding transactions; these issues are well worth discussing. In this paper, we propose a novel authentication scheme, conforming EPC C1G2 standards, at a low implementation cost for market application. In order to achieve mutual authentication, the proposed scheme integrates fingerprint biometrics, related cryptology and a hash function mechanism to ensure the security of the transmitted messages. The proposed scheme also can resist known attacks.