Báo cáo hóa học: " Research Article Controlled Delegation Protocol in Mobile RFID Netwo"

Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: IResearch Article Controlled Delegation Protocol in Mobile RFID Netwo | Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2010 Article ID 170150 13 pages doi 2010 170150 Research Article Controlled Delegation Protocol in Mobile RFID Networks Ming Hour Yang Information Computer Science Chung Yuan Christian University Chung Li 32023 Taiwan Correspondence should be addressed to Ming Hour Yang mhyang@ Received 11 May 2010 Revised 14 August 2010 Accepted 20 September 2010 Academic Editor Ibrahim Develi Copyright 2010 Ming Hour Yang. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use distribution and reproduction in any medium provided the original work is properly cited. To achieve off-line delegation for mobile readers we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags data. Compared with other delegation protocols our scheme uniquely enables back-end server to limit each reader s reading times during delegation. Even in a multireader situation our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server s delegation more flexible. Besides our protocol can prevent authorized readers from transferring their authority to the unauthorized declining invalid access to tags. Our scheme is proved viable and secure with GNY logic it is against certain security threats such as replay attacks denial of service DoS attacks Man-in-the-Middle attacks counterfeit tags and breaches of location and data privacy. Also the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme. 1. Introduction In recent years Radio Frequency Identification RFID has been widely used in security .

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
12    362    1    03-07-2024
125    176    1    03-07-2024
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.