Authentication with low-cost RFID tags in mobile networks

Chih Ta Yen, Ming Huang Guo, Nai Wei Lo, Der-Jiunn Deng

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

Recently, mobile networks and radio frequency identification (RFID) technologies are both widely applied by many enterprises to develop their applications. The third-generation (3G) mobile network technology is one of the popular mobile network technologies because service providers can serve users anytime and anywhere through 3G mobile network technology. A solution that combines RFID technology with 3G mobile network technology could identify users anytime and anywhere. However, RFID tags are limited in computation power and suffered from security threats, especially on mobile networks. An authentication with low-cost RFID tags in Mobile Networks should be proposed in this paper. This paper designs a key agreement mechanism to achieve consistency, integration, legality, and safety. In order to design a low-cost scheme, our authentication mechanism is built of simple XOR operations and one-way hash function. Although the computation cost of our proposed mechanism is not the best, our proposed mechanism can achieve more security requirements for practical applications.

Original languageEnglish
Pages (from-to)1021-1027
Number of pages7
JournalSecurity and Communication Networks
Volume6
Issue number8
DOIs
Publication statusPublished - 2013 Jan 1

Fingerprint

Radio frequency identification (RFID)
Authentication
Wireless networks
Costs
Hash functions
Industry

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Networks and Communications

Cite this

Yen, Chih Ta ; Guo, Ming Huang ; Lo, Nai Wei ; Deng, Der-Jiunn. / Authentication with low-cost RFID tags in mobile networks. In: Security and Communication Networks. 2013 ; Vol. 6, No. 8. pp. 1021-1027.
@article{6397d4da542c4cadba61bf54176e3c84,
title = "Authentication with low-cost RFID tags in mobile networks",
abstract = "Recently, mobile networks and radio frequency identification (RFID) technologies are both widely applied by many enterprises to develop their applications. The third-generation (3G) mobile network technology is one of the popular mobile network technologies because service providers can serve users anytime and anywhere through 3G mobile network technology. A solution that combines RFID technology with 3G mobile network technology could identify users anytime and anywhere. However, RFID tags are limited in computation power and suffered from security threats, especially on mobile networks. An authentication with low-cost RFID tags in Mobile Networks should be proposed in this paper. This paper designs a key agreement mechanism to achieve consistency, integration, legality, and safety. In order to design a low-cost scheme, our authentication mechanism is built of simple XOR operations and one-way hash function. Although the computation cost of our proposed mechanism is not the best, our proposed mechanism can achieve more security requirements for practical applications.",
author = "Yen, {Chih Ta} and Guo, {Ming Huang} and Lo, {Nai Wei} and Der-Jiunn Deng",
year = "2013",
month = "1",
day = "1",
doi = "10.1002/sec.667",
language = "English",
volume = "6",
pages = "1021--1027",
journal = "Security and Communication Networks",
issn = "1939-0114",
publisher = "John Wiley and Sons Inc.",
number = "8",

}

Authentication with low-cost RFID tags in mobile networks. / Yen, Chih Ta; Guo, Ming Huang; Lo, Nai Wei; Deng, Der-Jiunn.

In: Security and Communication Networks, Vol. 6, No. 8, 01.01.2013, p. 1021-1027.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Authentication with low-cost RFID tags in mobile networks

AU - Yen, Chih Ta

AU - Guo, Ming Huang

AU - Lo, Nai Wei

AU - Deng, Der-Jiunn

PY - 2013/1/1

Y1 - 2013/1/1

N2 - Recently, mobile networks and radio frequency identification (RFID) technologies are both widely applied by many enterprises to develop their applications. The third-generation (3G) mobile network technology is one of the popular mobile network technologies because service providers can serve users anytime and anywhere through 3G mobile network technology. A solution that combines RFID technology with 3G mobile network technology could identify users anytime and anywhere. However, RFID tags are limited in computation power and suffered from security threats, especially on mobile networks. An authentication with low-cost RFID tags in Mobile Networks should be proposed in this paper. This paper designs a key agreement mechanism to achieve consistency, integration, legality, and safety. In order to design a low-cost scheme, our authentication mechanism is built of simple XOR operations and one-way hash function. Although the computation cost of our proposed mechanism is not the best, our proposed mechanism can achieve more security requirements for practical applications.

AB - Recently, mobile networks and radio frequency identification (RFID) technologies are both widely applied by many enterprises to develop their applications. The third-generation (3G) mobile network technology is one of the popular mobile network technologies because service providers can serve users anytime and anywhere through 3G mobile network technology. A solution that combines RFID technology with 3G mobile network technology could identify users anytime and anywhere. However, RFID tags are limited in computation power and suffered from security threats, especially on mobile networks. An authentication with low-cost RFID tags in Mobile Networks should be proposed in this paper. This paper designs a key agreement mechanism to achieve consistency, integration, legality, and safety. In order to design a low-cost scheme, our authentication mechanism is built of simple XOR operations and one-way hash function. Although the computation cost of our proposed mechanism is not the best, our proposed mechanism can achieve more security requirements for practical applications.

UR - http://www.scopus.com/inward/record.url?scp=84880296849&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84880296849&partnerID=8YFLogxK

U2 - 10.1002/sec.667

DO - 10.1002/sec.667

M3 - Article

AN - SCOPUS:84880296849

VL - 6

SP - 1021

EP - 1027

JO - Security and Communication Networks

JF - Security and Communication Networks

SN - 1939-0114

IS - 8

ER -