2011
DOI: 10.1002/sec.339
|View full text |Cite
|
Sign up to set email alerts
|

Secure authentication mechanism for RFID tag in WLAN convergence 3G networks

Abstract: In the convergence network, the different technologies can be integrated to offer pervasive networking. Although it is able to provide better networking ability, the technical differentiation will make the management be more difficult. Especially when the security issues are considered, it is very necessary and important to develop some proper mechanisms for such a convergence environment. In this paper, we propose a secure authentication mechanism for third‐generation telecommunication (3G) and wireless local… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2014
2014
2015
2015

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 12 publications
(17 reference statements)
0
4
0
Order By: Relevance
“…For instance, given the original PIN code of one user was 2468, the reset one was 1234. In consequence, the KDA system was used to find out PR 1 , PR 2 , PR 3 , PR 4 , RP 12 , RP 23 , and RP 34 and employed the statistic classifier defined as in Equations (5) and (6) to distinguish. In other words, the user did not need to receive the training process again.…”
Section: Authentication Phasementioning
confidence: 99%
See 2 more Smart Citations
“…For instance, given the original PIN code of one user was 2468, the reset one was 1234. In consequence, the KDA system was used to find out PR 1 , PR 2 , PR 3 , PR 4 , RP 12 , RP 23 , and RP 34 and employed the statistic classifier defined as in Equations (5) and (6) to distinguish. In other words, the user did not need to receive the training process again.…”
Section: Authentication Phasementioning
confidence: 99%
“…Aside from phreaking, with the aid of the improvement on Internet technology [3,4], people can access e-banks, buy stocks, pay credit card bills, and utilize other financial services offered by cell phones. Once the thieves use the stolen cell phones to access the subscribers' financial information, suffers may lose a great amount of money.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…RFID technology has been widely applied in many real‐life applications such as contactless passport, books management, inventory control, and supply chain management. However, there are still many security and privacy concerns about RFID applications .…”
Section: Introductionmentioning
confidence: 99%