DocumentCode
501752
Title
A New RFID Authentication Protocol with Ownership Transfer in an Insecure Communication Environment
Author
Wang, Chih-Hung ; Chin, Shan
Author_Institution
Dept. of Comput. Sci. & Inf., Eng. Nat. Chiayi Univ., Chiayi, Taiwan
Volume
1
fYear
2009
fDate
12-14 Aug. 2009
Firstpage
486
Lastpage
491
Abstract
During recent years, RFID technology raises many privacy and security concerns. However, most previous works provided authentication protocols by the assumption of secure channel between the reader and the database. But this assumption is not suitable for wireless environment. In 2005, Yang et al. proposed a scheme in which the channel between the reader and the database is assumed to be insecure. Unfortunately, Yang et al.psilas scheme cannot achieve some critical security requirements. Due to above reason, we propose a new authentication protocol against all possible attacks and this method is secure even if the channel between the reader and the database may suffer from the attacks of interception, eavesdropping and masquerade. Additionally, the proposed scheme also supports the ownership transfer property inspired by Osaka et al.psilas and Lei-Caopsilas schemes.
Keywords
authorisation; database management systems; electronic data interchange; protocols; radiofrequency identification; Lei-Cao scheme; Osaka scheme; RFID authentication protocol; database system; eavesdropping; insecure communication environment; interception; masquerade; ownership transfer property; Authentication; Communication system security; Data security; Databases; Information security; National security; Privacy; Protocols; Radio frequency; Radiofrequency identification; Network Security; Ownership Transfer; RFID Authentication Scheme; Wireless Environment;
fLanguage
English
Publisher
ieee
Conference_Titel
Hybrid Intelligent Systems, 2009. HIS '09. Ninth International Conference on
Conference_Location
Shenyang
Print_ISBN
978-0-7695-3745-0
Type
conf
DOI
10.1109/HIS.2009.100
Filename
5254392
Link To Document