EMAP: An Efficient Mutual Authentication Protocol for Passive RFID Tags附视频

被引:0
|
作者
GuoRui Li Ying Wang CuiRong Wang JingSha He Electronic Information Department Northeastern University at Qinhuangdao Qinhuangdao PRC Department of Information Engineering Qinhuangdao Institute of Technology Qinhuangdao PRC School of Software Engineering Beijing University of Technology Beijing PRC [1 ,2 ,1 ,3 ,1 ,66004 ,2 ,66000 ,3 ,100124 ]
机构
关键词
D O I
暂无
中图分类号
TP391.44 [];
学科分类号
摘要
Radio frequency identification (RFID) system is a contactless automatic identification system, which uses small and low cost RFID tags. The primary problem of current security and privacy preserving schemes is that, in order to identify only one single tag, these schemes require a linear computational complexity on the server side. We propose an efficient mutual authentication protocol for passive RFID tags that provides confidentiality, untraceability, mutual authentication, and efficiency. The proposed protocol shifts the heavy burden of asymmetric encryption and decryption operations on the more powerful server side and only leaves lightweight hash operation on tag side. It is also efficient in terms of time complexity, space complexity, and communication cost, which are very important for practical large-scale RFID applications.
引用
收藏
页码:108 / 112
页数:5
相关论文
共 5 条
  • [1] Authentication and Access Control in RFID Based Logistics-customs Clearance Service Platform[J] Hui-Fang Deng1 Wen Deng2 Han Li3 ;4 Hong-Ji Yang4 1School of Computer Science and Engineering; South China University of Technology; Guangzhou 510006; PRC 2School of Software Engineering; South China University of Technology; Guangzhou 510006; PRC 3School of Computer Science and Technology; Dalian University of Technology; Dalian 116023; PRC 4School of Computing; De Montfort University; Leicester; LE1
  • [2] Mutual Authentication Protocols for RFID Systems[J] Ashrar A.Omer;Johnson P.Thomas; International Journal of Automation & Computing 2008, 04
  • [3] PAP: A privacy and authentication protocol for passive RFID tags[J] Alex X. Liu;LeRoy A. Bailey Computer Communications 2009,
  • [4] A survey of RFID privacy approaches[J] Marc Langheinrich Personal and Ubiquitous Computing 2009,
  • [5] An overview of RFID tags and new cryptographic developments[J] Matthew J.B. Robshaw Information Security Technical Report 2006,