Design of RFID Mutual Authentication Protocol for Mobile RFID 


Vol. 35,  No. 2, pp. 183-190, Feb.  2010


PDF
  Abstract

Recently, there is still vulnerability of attack, such as location tracking attack, replay attack, spoofing attack etc for all that is much research for Mobile RFID authentication. This paper designed method of making one time random number in DB server side unlike previously researched protocols, and it protects RFID communication from location tracking, replay attack and spoofing attack.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

S. Lee, E. Kim, M. Jun, "Design of RFID Mutual Authentication Protocol for Mobile RFID," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 2, pp. 183-190, 2010. DOI: .

[ACM Style]

Seung-Min Lee, Eun-Hwan Kim, and Moon-Seog Jun. 2010. Design of RFID Mutual Authentication Protocol for Mobile RFID. The Journal of Korean Institute of Communications and Information Sciences, 35, 2, (2010), 183-190. DOI: .

[KICS Style]

Seung-Min Lee, Eun-Hwan Kim, Moon-Seog Jun, "Design of RFID Mutual Authentication Protocol for Mobile RFID," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 2, pp. 183-190, 2. 2010.