- Research Article
- Open Access
Controlled Delegation Protocol in Mobile RFID Networks
EURASIP Journal on Wireless Communications and Networking volume 2010, Article number: 170150 (2010)
To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS) attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.
To access the full article, please see PDF.
About this article
Cite this article
Yang, M.H. Controlled Delegation Protocol in Mobile RFID Networks. J Wireless Com Network 2010, 170150 (2010). https://doi.org/10.1155/2010/170150
- Reading Time
- Data Privacy
- Mutual Authentication
- Security Threat
- Computation Load