Xie Run, Xu Chun-Xiang, Chen Wen-Jie, Li Wan-Peng. An RFID Authentication Protocol Anonymous against Readers[J]. Journal of Electronics & Information Technology, 2015, 37(5): 1241-1247. doi: 10.11999/JEIT140902
Citation:
Xie Run, Xu Chun-Xiang, Chen Wen-Jie, Li Wan-Peng. An RFID Authentication Protocol Anonymous against Readers[J]. Journal of Electronics & Information Technology, 2015, 37(5): 1241-1247. doi: 10.11999/JEIT140902
Xie Run, Xu Chun-Xiang, Chen Wen-Jie, Li Wan-Peng. An RFID Authentication Protocol Anonymous against Readers[J]. Journal of Electronics & Information Technology, 2015, 37(5): 1241-1247. doi: 10.11999/JEIT140902
Citation:
Xie Run, Xu Chun-Xiang, Chen Wen-Jie, Li Wan-Peng. An RFID Authentication Protocol Anonymous against Readers[J]. Journal of Electronics & Information Technology, 2015, 37(5): 1241-1247. doi: 10.11999/JEIT140902
In application of RFID (Radio Frequency IDentification), security threats are on the rise. The demand for the privacy protection of tag is becoming more and more urgent. In RFID system, the privacy protection is against not only the outside attacker, but also the readers. In many exists the representative researches, the tags are only anonymous and untraceable for the outside attackers. In this paper, the list of protocol and the the key updated of protocol are proposed, which allow RFID tags to authenticate to readers without revealing the tag identity or any other information that allows tags to be traced. Compared with the scheme proposed by Armknecht et al., two schemes achieves anonymousness and untraceability authentication of RFID tags without the help of anonymizer. Furthermore, the key updated of scheme make sure that the revocatory tags will not be still tracked by updating key .