Previous [ 1] [ 2] [ 3] [ 4] [ 5] [ 6] [ 7] [ 8] [ 9] [ 10] [ 11] [ 12] [ 13] [ 14] [ 15] [ 16] [ 17] [ 18] [ 19] [ 20] [ 21] [ 22] [ 23]

@

Journal of Information Science and Engineering, Vol. 26 No. 5, pp. 1875-1889 (September 2010)

Mutual RFID Authentication Scheme for Resource-constrained Tags*

NAI-WEI LO AND KUO-HUI YEH
Department of Information Management
National Taiwan University of Science and Technology
Taipei, 106 Taiwan

The design of a secure authentication scheme for Radio Frequency Identification (RFID) systems has been extensively studied in recent years in view of the awareness of individual privacy and the requirement of robust system security. However, based on security analyses conducted by other researchers and us, most of the proposed authentication schemes suffer a variety of security threats, privacy violation problems and heavy computation workload at the server. In this study, we introduce a mutual authentication scheme for resource-constrained RFID tags. Security analysis of proposed scheme and performance comparison with other schemes are done to show that our scheme can enhance data security, provide privacy protection and improve backend system performance for a generic RFID system with low-cost RFID tags.

Keywords: RFID, authentication, security, privacy, system efficiency

Full Text () Retrieve PDF document (201009_20.pdf)

Received September 11, 2008; revised January 10 & March 25, 2009; accepted April 30, 2009.
Communicated by Tzong-Chen Wu.
* This work was supported by TWISC project sponsored by the National Science Council, Taiwan, under Grants No. NSC 97-2219-E-001-001 and NSC 97-2219-E-011-006.