DocumentCode :
2446272
Title :
CA Based RFID Authentication Protocol for Privacy and Anonymity
Author :
Seo, Kang-Joong ; Jeon, Jun-Cheol ; Shin, Sang-Ho ; Yoo, Kee-Young
Author_Institution :
Dept. of Comput. Eng., Kyungpook Nat. Univ., Daegu
fYear :
2008
fDate :
July 27 2008-Aug. 1 2008
Firstpage :
278
Lastpage :
281
Abstract :
Okubo et al. proposed a hash-chain based authentication protocol which protects users´ location privacy and anonymity with strong forward security. However, Li et al. claimed that the hash-chain calculation must be a burden on low-cost RFID tags and gives back-end servers heavy calculation loads since the numbers for hash computation are required in a hash chaining technique. Thus, the non-group cellular automata chaining technique is adopted composed only of logical bitwise operations, in order to maintain both security guarantees and a low-cost construction.
Keywords :
cryptography; radiofrequency identification; RFID authentication protocol; hash computation; hash-chain calculation; non-group cellular automata chaining technique; strong forward security; user location privacy; Authentication; Computational modeling; Databases; Privacy; Protection; Protocols; RFID tags; Radio frequency; Radiofrequency identification; Wireless communication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless and Mobile Communications, 2008. ICWMC '08. The Fourth International Conference on
Conference_Location :
Athens
Print_ISBN :
978-0-7695-3274-5
Electronic_ISBN :
978-0-7695-3274-5
Type :
conf
DOI :
10.1109/ICWMC.2008.32
Filename :
4591300
Link To Document :
بازگشت