ABSTRACT Recently, mobile networks and radio frequency identification (RFID) technologies are both widely applied by many enterprises to develo"/>

Authentication with low-cost RFID tags in mobile networks.

SECURITY AND COMMUNICATION NETWORKS(2013)

引用 3|浏览9
暂无评分
摘要
ABSTRACT Recently, mobile networks and radio frequency identification (RFID) technologies are both widely applied by many enterprises to develop their applications. The third-generation (3G) mobile network technology is one of the popular mobile network technologies because service providers can serve users anytime and anywhere through 3G mobile network technology. A solution that combines RFID technology with 3G mobile network technology could identify users anytime and anywhere. However, RFID tags are limited in computation power and suffered from security threats, especially on mobile networks. An authentication with low-cost RFID tags in Mobile Networks should be proposed in this paper. This paper designs a key agreement mechanism to achieve consistency, integration, legality, and safety. In order to design a low-cost scheme, our authentication mechanism is built of simple XOR operations and one-way hash function. Although the computation cost of our proposed mechanism is not the best, our proposed mechanism can achieve more security requirements for practical applications. Copyright (c) 2013 John Wiley & Sons, Ltd.</div><span class="a-aminer-core-pub-c-paper-abstract-morebtn"><span>更多</span></span></div></div><div class="a-aminer-core-pub-c-paper-abstract-tranText">查看译文</div></div></div></div></span></div></div><div class="a-aminer-core-pub-index-titleBox"><div class="a-aminer-core-pub-index-keyTitle">关键词</div><div class="a-aminer-core-pub-index-titleKeys"><span>radio frequency identification<!-- -->,</span><span>third generation<!-- -->,</span><span>authentication</span></div></div></div><div class="background" style="margin-top:16px;margin-bottom:16px" id="summary"><div class="mainTitle"><span>AI 理解论文</span></div><div><div class="stitle" style="margin-top:16px;margin-bottom:16px"><span>溯源树</span></div><div class="a-aminer-core-pub-index-renderTree"><div class="a-aminer-core-pub-index-example"><div class="a-aminer-core-pub-index-topExampleText"><span>样例</span></div><img src="https://originalfileserver.aminer.cn/sys/aminer/pubs/mrt_preview.jpeg" alt=""/></div><div class="a-aminer-core-pub-index-layer"></div><div class="a-aminer-core-pub-index-pdfLoad"><div class="a-aminer-core-pub-index-pdfLoad_text"><span style="margin-right:24px"><svg class="icon" aria-hidden="true"><use xlink:href="#icon-suyuansu"></use></svg></span><span>生成溯源树,研究论文发展脉络</span></div></div></div></div></div></section><div><div class=""><section class="a-aminer-core-pub-index-rightBar"><div class="a-aminer-core-pub-index-commented "><div class="a-aminer-core-pub-index-bg"></div><div class="a-aminer-core-pub-index-title">Chat Paper</div><div class="a-core-home2-c-card-person-bottom-card-new-summary-index-summaryBox a-core-home2-c-card-person-bottom-card-new-summary-index-pubBox"><div class="a-core-home2-c-card-person-bottom-card-new-summary-index-loadingBox"><span class="a-core-home2-c-card-person-bottom-card-new-summary-index-loadingText">正在生成论文摘要</span><div class="ant-spin ant-spin-spinning"><i aria-label="icon: loading" style="font-size:24px" class="anticon anticon-loading ant-spin-dot"><svg viewBox="0 0 1024 1024" focusable="false" class="anticon-spin" data-icon="loading" width="1em" height="1em" fill="currentColor" aria-hidden="true"><path d="M988 548c-19.9 0-36-16.1-36-36 0-59.4-11.6-117-34.6-171.3a440.45 440.45 0 0 0-94.3-139.9 437.71 437.71 0 0 0-139.9-94.3C629 83.6 571.4 72 512 72c-19.9 0-36-16.1-36-36s16.1-36 36-36c69.1 0 136.2 13.5 199.3 40.3C772.3 66 827 103 874 150c47 47 83.9 101.8 109.7 162.7 26.7 63.1 40.2 130.2 40.2 199.3.1 19.9-16 36-35.9 36z"></path></svg></i></div></div></div></div></section></div></div></article></main></main></section></div> <script> window.g_useSSR = true; window.g_initialProps = {"global":{"collapsed":false,"preventRender":false,"isCompanyIp":false},"pub":{"paper":{"abstract":"\u003Ctitle content-type=\"main\"\u003EABSTRACT Recently, mobile networks and radio frequency identification (RFID) technologies are both widely applied by many enterprises to develop their applications. The third-generation (3G) mobile network technology is one of the popular mobile network technologies because service providers can serve users anytime and anywhere through 3G mobile network technology. A solution that combines RFID technology with 3G mobile network technology could identify users anytime and anywhere. However, RFID tags are limited in computation power and suffered from security threats, especially on mobile networks. An authentication with low-cost RFID tags in Mobile Networks should be proposed in this paper. This paper designs a key agreement mechanism to achieve consistency, integration, legality, and safety. In order to design a low-cost scheme, our authentication mechanism is built of simple XOR operations and one-way hash function. Although the computation cost of our proposed mechanism is not the best, our proposed mechanism can achieve more security requirements for practical applications. Copyright (c) 2013 John Wiley & Sons, Ltd.","abstract_zh":"","authors":[{"id":"53f4353bdabfaeecd695561c","name":"Chih-Ta Yen","org":"Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan"},{"id":"53f44810dabfaee4dc7d7b35","name":"Ming-Huang Guo","org":"Shih Hsin Univ, Dept Informat Management, Taipei, Taiwan","orgid":"5f71b2ca1c455f439fe3e466"},{"id":"53f42e2ddabfaee2a1c86c37","name":"Nai-Wei Lo","org":"Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan"},{"id":"5616de4f45ce1e5963b3a48b","name":"Der-Jiunn Deng","org":"Natl Changhua Univ Educ, Dept Comp Sci & Informat Engn, Changhua, Taiwan","orgid":"5f71b5cf1c455f439fe537e4"}],"doi":"10.1002\u002Fsec.667","id":"53e9b8bab7602d9704495877","is_downvoted":false,"is_starring":false,"is_upvoted":false,"issn":"1939-0114","keywords":["radio frequency identification","third generation","authentication"],"labels":["en_journal"],"lang":"en","num_citation":3,"num_starred":0,"num_upvoted":0,"num_viewed":9,"pages":{"end":"1027.0","start":"1021.0"},"title":"Authentication with low-cost RFID tags in mobile networks.","urls":["http:\u002F\u002Fdx.doi.org\u002F10.1002\u002Fsec.667","http:\u002F\u002Fwww.webofknowledge.com\u002F"],"venue":{"info":{"name":"SECURITY AND COMMUNICATION NETWORKS"},"issue":"8","volume":"6"},"venue_hhb_id":"5ea1aa56edb6e7d53c00bba6","versions":[{"id":"599c7876601a182cd25cb1a6","sid":"journals\u002Fscn\u002FYenGLD13","src":"dblp","vsid":"journals\u002Fscn","year":2013},{"id":"56d9033edabfae2eeee58154","sid":"1502811967","src":"mag","year":2013},{"id":"5ff599d2bf33bee3bae81f78","sid":"WOS:000321548600012","src":"wos","vsid":"SECURITY AND COMMUNICATION NETWORKS","year":2013},{"id":"6217b2185aee126c0fbd4e62","sid":"10.1002\u002Fsec.667","src":"crossref","vsid":"SECURITY AND COMMUNICATION NETWORKS","year":2013},{"id":"6228da895aee126c0fe8b80d","sid":"W1502811967","src":"openalex","vsid":"SECURITY AND COMMUNICATION NETWORKS","year":2013}],"year":2013},"authorsData":[{"id":"53f4353bdabfaeecd695561c","name":"Chih-Ta Yen","org":"Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan"},{"id":"53f44810dabfaee4dc7d7b35","name":"Ming-Huang Guo","org":"Shih Hsin Univ, Dept Informat Management, Taipei, Taiwan","orgid":"5f71b2ca1c455f439fe3e466"},{"id":"53f42e2ddabfaee2a1c86c37","name":"Nai-Wei Lo","org":"Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan"},{"id":"5616de4f45ce1e5963b3a48b","name":"Der-Jiunn Deng","org":"Natl Changhua Univ Educ, Dept Comp Sci & Informat Engn, Changhua, Taiwan","orgid":"5f71b5cf1c455f439fe537e4"}]}}; </script> <script src="https://fileserver.aminer.cn/lib/react-latest/react.production.min.js"></script> <script src="https://fileserver.aminer.cn/lib/react-latest/react-dom.production.min.js"></script> <script>window.__webpack_public_path__ = '/public/';</script><script src="//ssr.aminer.cn/public/umi.0b59174b.js"></script> <script src="https://hm.baidu.com/hm.js?dc703135c31ddfba7bcda2d15caab04e"></script> <script src="https://hm.baidu.com/hm.js?789fd650fa0be6a2a064d019d890b87f"></script> <script src="https://hm.baidu.com/hm.js?6b029ce1079ea4976b430cc9965724db"></script> <!-- <script src="https://fileserver.aminer.cn/misc/collect.min.js"></script> --> <script src="https://fileserver.aminer.cn/misc/collect.min.nano.update.js"></script> <!-- GIO --> <script> var _vds = _vds || []; window._vds = _vds; (function () { _vds.push(['setAccountId', 'ae8dfb99e5e4cda1']); (function () { var vds = document.createElement('script'); vds.type = 'text/javascript'; vds.async = true; vds.src = ('https:' == document.location.protocol ? 'https://' : 'http://') + 'assets.giocdn.com/vds.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(vds, s); })(); })(); </script> </body></html>