Authentication with low-cost RFID tags in mobile networks

Chih Ta Yen, Ming Huang Guo, Nai Wei Lo, Der Jiunn Deng

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)


Recently, mobile networks and radio frequency identification (RFID) technologies are both widely applied by many enterprises to develop their applications. The third-generation (3G) mobile network technology is one of the popular mobile network technologies because service providers can serve users anytime and anywhere through 3G mobile network technology. A solution that combines RFID technology with 3G mobile network technology could identify users anytime and anywhere. However, RFID tags are limited in computation power and suffered from security threats, especially on mobile networks. An authentication with low-cost RFID tags in Mobile Networks should be proposed in this paper. This paper designs a key agreement mechanism to achieve consistency, integration, legality, and safety. In order to design a low-cost scheme, our authentication mechanism is built of simple XOR operations and one-way hash function. Although the computation cost of our proposed mechanism is not the best, our proposed mechanism can achieve more security requirements for practical applications.

Original languageEnglish
Pages (from-to)1021-1027
Number of pages7
JournalSecurity and Communication Networks
Issue number8
Publication statusPublished - 2013 Aug

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Authentication with low-cost RFID tags in mobile networks'. Together they form a unique fingerprint.

Cite this