An improved authentication protocol for mobile agent device in RFID environment
نویسندگان
چکیده
In the past researches, most of the authentication protocols were designed in an effort to solve the RFID security and privacy problem regarding the encrypted communication between the database and readers, and readers and tags. Based on the proposal of mobile agent device for RFID privacy protection (MARP), some security problems have been exposed. Later on, protecting the privacy with a mobile agent device in RFID environment (eMARP) has shown improvement on MARP. The mobile agent device provides more powerful computation than the tag, in addition to the privacy protection along with the forgery detection. However, we found out that the authentication protocol of eMARP could not resist location tracking. Therefore, we will discuss and demonstrate that the eMARPbased RFID system doesn’t have ability to achieve location tracking in this paper. We have improved the authentication protocol of eMARPbased RFID system and also have eliminated its vulnerability.
منابع مشابه
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملA Forward Secured Authentication Protocol for Mobile Rfid Systems
The integration of RFID technology and mobile smart device stimulates the daily increasing popularity of mobile RFID-based applications, which makes its way to become a new hot zone for research and development. Current RFID authentication schemes are not viable to use in mobile RFID environment. The authentication schemes result in computing load to the low cost tag and provide insufficient pr...
متن کاملA Secure and Efficient Authentication Protocol for Mobile RFID Systems
AbstrAct: The design of a secure communication scheme for Radio Frequency Identification (RFID) systems has been extensively studied in recent years in view of the awareness of individual privacy and the requirement of robust system security. Most of previous works assume the communication channel between an RFID reader and its backend server is secure and concentrate on the security enhancemen...
متن کاملEfficient and Timely Mutual Authentication Scheme for RFID Systems
The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks which limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceabil...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJMC
دوره 10 شماره
صفحات -
تاریخ انتشار 2012