Abstract
In this paper, we propose an ownership transfer scheme that applies in mobile RFID networks. The scheme includes a mutual authentication protocol and a role-based ownership transfer protocol. A tag will decide what actions are allowed for a reader according to the reader's role class, and the back-end server will send to the reader the requested information about the tag. Keyed-hash functions are used to secure the protocols. Last, we prove that our protocol can do against the threats of replay attacks, distributed denial of service (DDoS), Man-in-the-Middle (MITM) attacks that change users' data, interception of data and location privacy, and tracking of tags' ownership transfer. Keywords-RFID;authentication; ownership transfer
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advancements in Computing Technology
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.