2010 International Conference on Broadband, Wireless Computing, Communication and Applications 2010
DOI: 10.1109/bwcca.2010.108
|View full text |Cite
|
Sign up to set email alerts
|

Based on Mobile RFID Device to Design a Secure Mutual Authentication Scheme for Market Application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 17 publications
0
0
0
Order By: Relevance
“…For this problem, there are two ways to solve [1]: (1) It allows backstage database to effectively look for the used key and identification; (2) The tag's identity or status is renewed frequently, and it allows backstage database to effectively infer tag initial identity. Adopting to the former protocol is non-state protocol [2], which its authentication efficiency is low, and the calculating works on backstage database is so heavy, it only suits the small scale application which the number of tag is a little [3,4]. However, adopting to the later protocol is state one [2], which its authentication efficiency is high, it suits the big scale application which the number of tag is much, but the key problem is synchronization between tag and database [5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For this problem, there are two ways to solve [1]: (1) It allows backstage database to effectively look for the used key and identification; (2) The tag's identity or status is renewed frequently, and it allows backstage database to effectively infer tag initial identity. Adopting to the former protocol is non-state protocol [2], which its authentication efficiency is low, and the calculating works on backstage database is so heavy, it only suits the small scale application which the number of tag is a little [3,4]. However, adopting to the later protocol is state one [2], which its authentication efficiency is high, it suits the big scale application which the number of tag is much, but the key problem is synchronization between tag and database [5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…Most RFID authentication protocols are developed for the insecure channel between tag and reader [3,[5][6][7][8], nevertheless, in the mobile RFID system, reader communicates with the backstage database in the wireless unsafe channel, therefore, we should consider perfectly the link into the design of the protocol in privacy protect and safety authentication. In the article [4], the protocol considered the unsafe communication between the backstage database and the reader, and design a method that authenticated the identity among the database, the reader and the tag by using the CRC algorithm, the operation of exclusive-OR and the random number generator. Also, it built a session key, however, it need eight communications altogether, and all tags and backstage database shared the same private h(T-mark).…”
Section: Introductionmentioning
confidence: 99%