Sciweavers

EJWCN
2010

Controlled Delegation Protocol in Mobile RFID Networks

13 years 6 months ago
Controlled Delegation Protocol in Mobile RFID Networks
To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multi-reader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS) attacks, Man-in-the-Middle attacks, ...
Ming-Hour Yang
Added 17 May 2011
Updated 17 May 2011
Type Journal
Year 2010
Where EJWCN
Authors Ming-Hour Yang
Comments (0)