A mobile RFID-based mutual authentication protocol using elliptic curve cryptography for security patrolling application

Wen Tsai Ko*, Erl Huei Lu, Shin Yan Chiou, Henry Ker Chang Chang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

The researches of mobile RFID (Radio-Frequency IDentification) applications in recent years have increased noticeably. They combine the technology of RFID and mobile device to create a new convenient application area for people. But they also suffer from the security issues because the insecure communication channel among tags, readers and databases. In 2012, Zhou et al. proposed a mutual authentication protocol using ECC (Elliptic Curve Cryptography) for mobile RFID applications. However in their protocol, we found that once the reader successfully read the data of a certain tag from the server, then the reader can read it unlimited times without reading that tag again. Therefore, their protocol cannot support some mobile RFID applications such as the security patrolling application. In this paper, we propose a new mobile RFID mutual authentication protocol that is suitable for security patrolling application.

Original languageEnglish
Title of host publicationRadio Frequency Identification System Security. RFIDsec'12 Asia Workshop Proceedings
PublisherIOS Press
Pages63-71
Number of pages9
ISBN (Print)9781614991427
DOIs
StatePublished - 2012

Publication series

NameCryptology and Information Security Series
Volume8
ISSN (Print)1871-6431
ISSN (Electronic)1879-8101

Keywords

  • Elliptic curve cryptography (ECC)
  • Mobile RFID
  • Mutual authentication
  • Radio-frequency identification (RFID)

Fingerprint

Dive into the research topics of 'A mobile RFID-based mutual authentication protocol using elliptic curve cryptography for security patrolling application'. Together they form a unique fingerprint.

Cite this