DocumentCode :
473014
Title :
A design of e-ID authentication protocol in Gen2 environment
Author :
Choi, Yong-Sik ; Han, Soo ; Shin, Seung Ho
Author_Institution :
Dept. of Comput. Sci. & Eng., Incheon Univ., Incheon
Volume :
1
fYear :
2008
fDate :
17-20 Feb. 2008
Firstpage :
246
Lastpage :
251
Abstract :
In Gen2 standard basis, hash function, symmetrical algorithm and the like are not supported. As security vulnerability between vertical sections, cloning, wiretapping, middleware and service refusal attacks are possible due to absence of mutual authentication mechanism between tag-readers. Through mutual authentication mechanism between tag and reader, and multiple reader management technique, efficiency in multiple reader management is provided. Hereby, security is enhanced by effectively protecting from clone, wiretapping and middleware attack of tag, which can be used as e-id.
Keywords :
cryptographic protocols; message authentication; telecommunication network management; telecommunication security; Gen2 environment; clone protection; e-ID authentication protocol design; middleware attack; multiple reader management technique; mutual authentication mechanism; security vulnerability; service refusal attack; vertical sections; wiretapping protection; Access protocols; Authentication; Cloning; Computer crashes; Frequency conversion; Frequency division multiaccess; Information security; Interference; Middleware; Radiofrequency identification; Gen2; Hash Lock; Tag; authentication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Communication Technology, 2008. ICACT 2008. 10th International Conference on
Conference_Location :
Gangwon-Do
ISSN :
1738-9445
Print_ISBN :
978-89-5519-136-3
Type :
conf
DOI :
10.1109/ICACT.2008.4493754
Filename :
4493754
Link To Document :
بازگشت