Authors: Chia-Hui Wei, Min-Shiang Hwang, Augustin Yeh-Hao Chin
Addresses: Department of Computer Science, National Tsing Hua University, 101, Section 2, Kuang Fu Road, Hsinchu 300, Taiwan. ' Department of Computer Science and Information Engineering, Asia University, 500, Lioufeng Rd., Wufeng, Taichung 41354, Taiwan. ' Department of Computer Science, National Tsing Hua University, 101, Section 2, Kuang Fu Road, Hsinchu 300, Taiwan
Abstract: Radio Frequency Identification (RFID) system can be read by radio wave within several metres without having direct contact. Many research focus on improving security and privacy problem. Recently, Rizomiliotis et al. point out that Song-Mitchell protocol is vulnerable to the denial of service attack, since the attacker can easily modify the data to make the server and the tag out of synchronisation without detection. However, this paper pointed out that Rizomiliotis et al.|s modification was not correct. Therefore, we designed a new authentication scheme, which inherits the advantage of Song-Mitchell protocol and Rizomiliotis et al.|s protocol, along with the assumption that the insecure channel exists between the reader and the server. Finally, this paper provides a security analysis to comparison with other protocols.
Keywords: authentication protocol; RFID tags; security; privacy; denial of service; DoS; mobile communications; radio frequency identification.
International Journal of Mobile Communications, 2011 Vol.9 No.2, pp.208 - 223
Available online: 18 May 2011 *Full-text access for editors Access for subscribers Purchase this article Comment on this article