TY - JOUR
T1 - Authentication with low-cost RFID tags in mobile networks
AU - Yen, Chih Ta
AU - Guo, Ming Huang
AU - Lo, Nai Wei
AU - Deng, Der Jiunn
N1 - Copyright:
Copyright 2019 Elsevier B.V., All rights reserved.
PY - 2013/8
Y1 - 2013/8
N2 - Recently, mobile networks and radio frequency identification (RFID) technologies are both widely applied by many enterprises to develop their applications. The third-generation (3G) mobile network technology is one of the popular mobile network technologies because service providers can serve users anytime and anywhere through 3G mobile network technology. A solution that combines RFID technology with 3G mobile network technology could identify users anytime and anywhere. However, RFID tags are limited in computation power and suffered from security threats, especially on mobile networks. An authentication with low-cost RFID tags in Mobile Networks should be proposed in this paper. This paper designs a key agreement mechanism to achieve consistency, integration, legality, and safety. In order to design a low-cost scheme, our authentication mechanism is built of simple XOR operations and one-way hash function. Although the computation cost of our proposed mechanism is not the best, our proposed mechanism can achieve more security requirements for practical applications.
AB - Recently, mobile networks and radio frequency identification (RFID) technologies are both widely applied by many enterprises to develop their applications. The third-generation (3G) mobile network technology is one of the popular mobile network technologies because service providers can serve users anytime and anywhere through 3G mobile network technology. A solution that combines RFID technology with 3G mobile network technology could identify users anytime and anywhere. However, RFID tags are limited in computation power and suffered from security threats, especially on mobile networks. An authentication with low-cost RFID tags in Mobile Networks should be proposed in this paper. This paper designs a key agreement mechanism to achieve consistency, integration, legality, and safety. In order to design a low-cost scheme, our authentication mechanism is built of simple XOR operations and one-way hash function. Although the computation cost of our proposed mechanism is not the best, our proposed mechanism can achieve more security requirements for practical applications.
UR - http://www.scopus.com/inward/record.url?scp=84880296849&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84880296849&partnerID=8YFLogxK
U2 - 10.1002/sec.667
DO - 10.1002/sec.667
M3 - Article
AN - SCOPUS:84880296849
VL - 6
SP - 1021
EP - 1027
JO - Security and Communication Networks
JF - Security and Communication Networks
SN - 1939-0114
IS - 8
ER -