Enhanced RFID mutual authentication scheme based on shared secret information

Ray, Biplob R. and Chowdhury, Morshed U. 2010, Enhanced RFID mutual authentication scheme based on shared secret information, in CAINE 2010 : Proceedings of the ISCA 23rd International Conference on Computer Applications in Industry and Engineering, International Society for Computers and their Applications (ISCA)., Cary, N.C., pp. 208-213.

Attached Files
Name Description MIMEType Size Downloads

Title Enhanced RFID mutual authentication scheme based on shared secret information
Author(s) Ray, Biplob R.
Chowdhury, Morshed U.
Conference name International Conference on Computer Applications in Industry and Engineering (23rd : 2010 : Las Vegas, Nev.)
Conference location Las Vegas, Nev.
Conference dates 8-10 Nov. 2010
Title of proceedings CAINE 2010 : Proceedings of the ISCA 23rd International Conference on Computer Applications in Industry and Engineering
Editor(s) Harris, Frederick C. Jr.
Hu, Fei
Publication date 2010
Conference series Computer Applications in Industry and Engineering Conference
Start page 208
End page 213
Total pages 6
Publisher International Society for Computers and their Applications (ISCA).
Place of publication Cary, N.C.
Keyword(s) RFID
privacy
authentication
untraceability
cloning
rouge reader
LAMED
Summary RFID is a revolutionary remote technology which has many useful implications. Large scale implementation of RFID is seeking 100% information privacy and untraceability, for users and organizations, which is suitable for low cost RFID tag (Class1). To protect users and organization we are proposing an enhanced RFID mutual authentication scheme. In this protocol we use authentication based on shared unique parameters as a method to protect privacy. This protocol will be capable of handling forward and backward security, rouge reader better than existing protocols. In our new scheme we involved RFID reader’s hardware ID in addition to other shared secret information which uses hash to protect users and industries privacy. Moreover, we used LAMED as our PRNG (Pseudorandom Number Generator) which is faster and take less computational power.
ISBN 9781880843796
Language eng
Field of Research 080503 Networking and Communications
Socio Economic Objective 890199 Communication Networks and Services not elsewhere classified
HERDC Research category E1 Full written paper - refereed
HERDC collection year 2010
Copyright notice ©2010, International Society for Computers and their Applications (ISCA). All Rights Reserved.
Persistent URL http://hdl.handle.net/10536/DRO/DU:30034493

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 397 Abstract Views, 4 File Downloads  -  Detailed Statistics
Created: Wed, 04 May 2011, 16:26:46 EST by Sandra Dunoon

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.