An improved authentication protocol for mobile agent device in RFID environment Online publication date: Tue, 07-Aug-2012
by Chia-Hui Wei; Min-Shiang Hwang; Augustin Yeh-Hao Chin
International Journal of Mobile Communications (IJMC), Vol. 10, No. 5, 2012
Abstract: In the past researches, most of the authentication protocols were designed in an effort to solve the RFID security and privacy problem regarding the encrypted communication between the database and readers, and readers and tags. Based on the proposal of Mobile Agent device for RFID privacy Protection (MARP), some security problems have been exposed. Later on, protecting the privacy with a mobile agent device in RFID environment (eMARP) has shown improvement on MARP. The mobile agent device provides more powerful computation than the tag, in addition to the privacy protection along with the forgery detection. However, we found out that the authentication protocol of eMARP could not resist location tracking. Therefore, we will discuss and demonstrate that the eMARP-based RFID system does not have ability to achieve location tracking in this paper. We have improved the authentication protocol of eMARP-based RFID system and also have eliminated its vulnerability.
Online publication date: Tue, 07-Aug-2012
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Mobile Communications (IJMC):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.If you still need assistance, please email firstname.lastname@example.org