Title :
Secure and Serverless RFID Authentication and Search Protocols
Author :
Tan, Chiu C. ; Sheng, Bo ; Li, Qun
Author_Institution :
Coll. of William & Mary, Williamsburg
fDate :
4/1/2008 12:00:00 AM
Abstract :
With the increased popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection for users. Most recent RFID protocols use a central database to store the RFID tag data. The RFID reader first queries the RFID tag and returns the reply to the database. After authentication, the database returns the tag data to the reader. In this paper, we propose a more flexible authentication protocol that provides comparable protection without the need for a central database. We also suggest a protocol for secure search for RFID tags. We believe that as RFID applications become widespread, the ability to securely search for RFID tags will be increasingly useful.
Keywords :
message authentication; protocols; radiofrequency identification; telecommunication security; RFID protocols; RFID tag data; authentication protocol; privacy protection; radiofrequency identification; search protocol; security; Authentication; Computer science; Data privacy; Data security; Databases; Frequency diversity; Protection; Protocols; RFID tags; Radiofrequency identification;
Journal_Title :
Wireless Communications, IEEE Transactions on
DOI :
10.1109/TWC.2008.061012