Sciweavers

Share
TWC
2008

Secure and Serverless RFID Authentication and Search Protocols

9 years 9 months ago
Secure and Serverless RFID Authentication and Search Protocols
With the increased popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection for users. Most recent RFID protocols use a central database to store the RFID tag data. The RFID reader first queries the RFID tag and returns the reply to the database. After authentication, the database returns the tag data to the reader. In this paper, we propose a more flexible authentication protocol that provides comparable protection without the need for a central database. We also suggest a protocol for secure search for RFID tags. We believe that as RFID applications become widespread, the ability to securely search for RFID tags will be increasingly useful.
Chiu Chiang Tan, Bo Sheng, Qun Li
Added 16 Dec 2010
Updated 16 Dec 2010
Type Journal
Year 2008
Where TWC
Authors Chiu Chiang Tan, Bo Sheng, Qun Li
Comments (0)
books