Advanced Search
Volume 37 Issue 5
May  2015
Turn off MathJax
Article Contents
Xie Run, Xu Chun-Xiang, Chen Wen-Jie, Li Wan-Peng. An RFID Authentication Protocol Anonymous against Readers[J]. Journal of Electronics & Information Technology, 2015, 37(5): 1241-1247. doi: 10.11999/JEIT140902
Citation: Xie Run, Xu Chun-Xiang, Chen Wen-Jie, Li Wan-Peng. An RFID Authentication Protocol Anonymous against Readers[J]. Journal of Electronics & Information Technology, 2015, 37(5): 1241-1247. doi: 10.11999/JEIT140902

An RFID Authentication Protocol Anonymous against Readers

doi: 10.11999/JEIT140902
  • Received Date: 2014-07-09
  • Rev Recd Date: 2014-12-08
  • Publish Date: 2015-05-19
  • In application of RFID (Radio Frequency IDentification), security threats are on the rise. The demand for the privacy protection of tag is becoming more and more urgent. In RFID system, the privacy protection is against not only the outside attacker, but also the readers. In many exists the representative researches, the tags are only anonymous and untraceable for the outside attackers. In this paper, the list of protocol and the the key updated of protocol are proposed, which allow RFID tags to authenticate to readers without revealing the tag identity or any other information that allows tags to be traced. Compared with the scheme proposed by Armknecht et al., two schemes achieves anonymousness and untraceability authentication of RFID tags without the help of anonymizer. Furthermore, the key updated of scheme make sure that the revocatory tags will not be still tracked by updating key .
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1250) PDF downloads(423) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return