Security analysis on anonymous mutual authentication protocol for RFID tag without back-end database and its improvement

Songyi Kim, Kwangwoo Lee, Seungjoo Kim, Dongho Won

Research output: Contribution to journalArticle

4 Citations (Scopus)

Abstract

RFID (Radio Frequency IDentification) system has been widely used in our life, such as transport systems, passports, automotive, animal tracking, human implants, library, and so on. However, the RFID authentication protocols between RF (Radio Frequency) tags and the RF readers have been bring about various privacy problems that anonymity of the tags, tracking, eavesdropping, and so on. Many researchers have proposed the solution of the problems. However, they still have the problem, such as location privacy, mutual authentication. In this paper, we show the problems of the previous protocols, and then we propose a more secure and efficient RFID authentication protocol.

Original languageEnglish
Pages (from-to)460-464
Number of pages5
JournalWorld Academy of Science, Engineering and Technology
Volume59
Publication statusPublished - 2009 Nov
Externally publishedYes

Keywords

  • Anonymity
  • Mutual authentication
  • RFID
  • Serverless

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'Security analysis on anonymous mutual authentication protocol for RFID tag without back-end database and its improvement'. Together they form a unique fingerprint.

  • Cite this