Deng, 2012 - Google Patents
A DTN-based RFID protocolDeng, 2012
View PDF- Document ID
- 12131521583196310313
- Author
- Deng X
- Publication year
External Links
Snippet
In this thesis, we propose a lightweight Radio-frequency identification (RFID) mutual au thentication protocol without permanent backend server connections. Only pseudo-random number generator (PRNG) and XOR operations are used in our protocol. Mutual authen …
- 230000001360 synchronised 0 abstract description 23
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Čapkun et al. | SECTOR: secure tracking of node encounters in multi-hop wireless networks | |
Guo et al. | Independent mix zone for location privacy in vehicular networks | |
KR100878764B1 (en) | Wireless LAN System for User Anonymity Guarantee and User Anonymity Guarantee Method | |
Peris-Lopez et al. | Flaws on RFID grouping-proofs. Guidelines for future sound protocols | |
EP3701667B1 (en) | Anonymity system for goods delivery | |
Burmester et al. | Universally composable RFID identification and authentication protocols | |
CN101645899B (en) | Bidirectional authentication method and system based on symmetric encipherment algorithm | |
Grover et al. | A survey of broadcast authentication schemes for wireless networks | |
Niu et al. | Privacy and authentication protocol for mobile RFID systems | |
Burgner et al. | Security of wireless sensor networks | |
CN106357396A (en) | Digital signature method, digital signature system and quantum key card | |
Yadav et al. | An EAP-based mutual authentication protocol for WLAN-connected IoT devices | |
Bilal et al. | Security analysis of ultra-lightweight cryptographic protocol for low-cost RFID tags: Gossamer protocol | |
Kumar et al. | Simulation and analysis of authentication protocols for mobile Internet of Things (MIoT) | |
CN109314712A (en) | It is routed based on encryption Partial Blind Signature and the multi-hop secure content for being embedded in clause | |
Yang et al. | Protocol for ownership transfer across authorities: with the ability to assign transfer target | |
Yang et al. | Privacy-preserving group authentication for RFID tags using bit-collision patterns | |
Saleem et al. | Secure RFID-assisted authentication protocol for vehicular cloud computing environment | |
Raad et al. | Secure data in lorawan network by adaptive method of elliptic-curve cryptography | |
CN107040363B (en) | Method and system for lightweight RFID ownership transfer based on chaotic encryption | |
Bok et al. | An Energy‐Efficient Secure Scheme in Wireless Sensor Networks | |
Yan et al. | A trust-third-party based key management protocol for secure mobile RFID service based on the Internet of Things | |
Ray et al. | Secure mobile RFID ownership transfer protocol to cover all transfer scenarios | |
Deng | A DTN-based RFID protocol | |
Yu et al. | Trust-based Mutual Authentication for Bootstrapping in 6LoWPAN. |