z-logo
Premium
Server‐less RFID authentication and searching protocol with enhanced security
Author(s) -
Lee ChinFeng,
Chien HungYu,
Laih ChiSung
Publication year - 2012
Publication title -
international journal of communication systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.344
H-Index - 49
eISSN - 1099-1131
pISSN - 1074-5351
DOI - 10.1002/dac.1246
Subject(s) - computer science , radio frequency identification , authentication (law) , protocol (science) , authentication protocol , cryptographic protocol , computer security , hash function , identification (biology) , computer network , authentication server , cryptography , medicine , botany , alternative medicine , pathology , biology
SUMMARY This paper focuses on two interesting radio‐frequency identification (RFID) cryptographic protocols: the server‐less RFID authentication protocol that allows readers to authenticate tags without the help of any online backend servers, and the RFID searching protocol in which the verifier explicitly specifies the target tag to be searched and authenticated. These two kinds of RFID protocols play important roles in many RFID applications; however, the existing protocols either had security weaknesses or exhibited poor efficiency. This paper shows the weaknesses, and then proposes our server‐less RFID authentication protocol and RFID searching protocol. The proposed protocols greatly enhance the security using one more hashing. Copyright © 2011 John Wiley & Sons, Ltd.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here