Authors: Ming-Hour Yang
Addresses: Department of Information and Computer Engineering, Chung Yuan Christian University, 32023 Taiwan
Abstract: Current RFID authentication schemes are not suitable for use in a mobile RFID environment since the proposed authentication schemes result in a computing load because of the low-cost tag and provide insufficient protection to the information and to the privacy of the user. Therefore, we propose a lightweight authentication protocol for mobile RFID networks that complies with Electronic Product Code (EPC) Class-1 Gen-2 norms, effectively achieving forward security. We use the GNY logic analysis to show what the proposed authentication protocol can do against threats of replay attacks, spoofing, Man-In-The-Middle (MITM), counterfeit tag and message loss.
Keywords: mobile RFID networks; RFID authentication; location privacy; replay attacks; MITM attacks; man-in-the-middle attacks; radio frequency identification; security; information protection; mobile networks; lightweight authentication; spoofing; counterfeit tags; message loss.
International Journal of Security and Networks, 2010 Vol.5 No.1, pp.53 - 62
Published online: 31 Dec 2009 *Full-text access for editors Access for subscribers Purchase this article Comment on this article