A study on secure RFID mutual authentication scheme in pervasive computing environment

被引:38
|
作者
Kang, Soo-Young [1 ]
Lee, Deok-Gyu [2 ]
Lee, Im-Yeong [1 ]
机构
[1] Soonchunhyang Univ, Div Comp, Asan 336745, Chungchungnam D, South Korea
[2] Elect & Telecommun Res Inst, Taejon 305700, Chungchungnam D, South Korea
关键词
RFID; Authentication; Privacy; Insecure communication channel; Pervasive computing environment;
D O I
10.1016/j.comcom.2008.05.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RFID, a core technology that can be used to create a ubiquitous society, is a non-contact recognition system in which a small chip attached to various types of products transmits and processes information regarding the product and the surrounding environment via wireless communication. As a wireless recognition technology, RFID consumes little power, is small, and allows one to communicate in virtually any environment. It is thus expected to be very convenient. However, due to these characteristics of RFID systems, it may also pose a serious threat to privacy. A number of studies are currently being conducted to address this problem. Most of these studies use secure communication channels between a database and a reader, and insecure communication channels between a reader and a tag. However, this paper proposes a secure authentication protocol to provide information to an authorized entity by applying recognition technology in an insecure communication channel even for the communication between the database and the reader. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:4248 / 4254
页数:7
相关论文
共 50 条
  • [1] Attacks on and Countermeasures for an RFID Mutual Authentication Scheme in Pervasive Computing Environment
    Mohaisen, Abedelaziz
    Chang, Ku-Young
    Hong, Dowon
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (09): : 1684 - 1697
  • [2] CLIBDA: A Deniable Authentication Scheme for Pervasive Computing Environment
    Ahene, Emmanuel
    Guan, Yuanfeng
    Zhang, Zhiwei
    Li, Fagen
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 67 - 83
  • [3] A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment
    Dewanta, Favian
    Mambo, Masahiro
    [J]. IEEE ACCESS, 2019, 7 : 103095 - 103114
  • [4] A Secure Mutual authentication approach to fog computing environment
    Kalaria, Rudri
    Kayes, A. S. M.
    Rahayu, Wenny
    Pardede, Eric
    [J]. COMPUTERS & SECURITY, 2021, 111
  • [5] FogSec: A secure and effective mutual authentication scheme for fog computing
    Sree, Thankaraja Raja
    Harish, R.
    Veni, T.
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (12):
  • [6] An inter-domain authentication scheme for pervasive computing environment
    Yao, Lin
    Wang, Lei
    Kong, Xiangwei
    Wu, Guowei
    Xia, Feng
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (02) : 234 - 244
  • [7] A new secure authentication scheme for cloud computing environment
    Namasudra, Suyel
    Roy, Pinki
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (20):
  • [8] Mutual authentication scheme of IoT devices in fog computing environment
    Singh, Sunakshi
    Chaurasiya, Vijay Kumar
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03): : 1643 - 1657
  • [9] Mutual authentication scheme of IoT devices in fog computing environment
    Sunakshi Singh
    Vijay Kumar Chaurasiya
    [J]. Cluster Computing, 2021, 24 : 1643 - 1657
  • [10] A secure lightweight mutual authentication scheme in Social Industrial IoT environment
    Ben Amor, Arij
    Jebri, Sarra
    Abid, Mohamed
    Meddeb, Aref
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (12): : 13578 - 13600