z-logo
open-access-imgOpen Access
Design of a Secure RFID Authentication Scheme Preceding Market Transactions
Author(s) -
ChinLing Chen
Publication year - 2011
Publication title -
mobile information systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.346
H-Index - 34
eISSN - 1875-905X
pISSN - 1574-017X
DOI - 10.1155/2011/940942
Subject(s) - computer science , hash function , computer security , scheme (mathematics) , authentication (law) , fingerprint (computing) , mutual authentication , cryptography , cryptographic hash function , hash chain , computer network , mathematical analysis , mathematics
In recent years, as RFID reader equipment is ever more widely deployed in handled devices, the importance of security problems among RFID reader, tags and server have obviously gained increased attention. However, there are still many security issues preceding transactions; these issues are well worth discussing. In this paper, we propose a novel authentication scheme, conforming EPC C1G2 standards, at a low implementation cost for market application. In order to achieve mutual authentication, the proposed scheme integrates fingerprint biometrics, related cryptology and a hash function mechanism to ensure the security of the transmitted messages. The proposed scheme also can resist known attacks.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom