By Topic

Design of RFID Mutual Authentication Protocol Using Time Stamp

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Chang-Hyun Cho ; Dept. of Comput. Sci., Soongsil Univ., Seoul, South Korea ; Kyoung-Hwa Do ; Jae-Woo Kim ; Moon-Seog Jun

Nowadays, there are many active studies and applications of RFID authentication protocol. Because RFID communicates wirelessly without contacting a reader, its communicated information is more likely to be exposed compared to ordinary wired communication area. Communicated information can be easily eavesdropped by external attacks and such stolen information can be used for malicious purpose, which causes security accidents. In order to complement such weakness, countless RFID authentication protocols have been studied. However, they still have weaknesses in tracking, replay attack and spoofing. In this paper, a protocol has been designed which is safe from tracking, replay attack and spoofing using time stamp which is generated also in Back-End DB unlike other existing protocols.

Published in:

Computer Sciences and Convergence Information Technology, 2009. ICCIT '09. Fourth International Conference on

Date of Conference:

24-26 Nov. 2009