Keep all mobile users′ whereabouts secure: a radio frequency identification protocol anti-tracking in 5G
- Publisher:
- WILEY
- Publication Type:
- Journal Article
- Citation:
- International Journal of Communication Systems, 2016, 29, (16), pp. 2375-2387
- Issue Date:
- 2016-11-10
Closed Access
Filename | Description | Size | |||
---|---|---|---|---|---|
ContentServer (18).pdf | Published version | 334.32 kB |
Copyright Clearance Process
- Recently Added
- In Progress
- Closed Access
This item is closed access and not available.
In the fifth generation mobile networks (in short, 5G), radio frequency identification (RFID) tags are embedded in a growing number of personal items, especially in smartphones. The RFID authentication protocols in 5G should be anti-scanning and privacy-enhancing, because RFID tags in smartphones often suffer from leaking private trace of mobile users. However, majorities of existing RFID protocols are vulnerable to location-tracking threats, and to distributed denial of service (DDoS) attacks on back-end servers. To eliminate these threats, we propose a hash-based mutual authentication protocol for smartphones in 5G. This protocol protects individuals' location privacy against malicious hidden scanning in public places. By the authentication of RFID readers via hash values, the proposed protocol is robust against the aforementioned threats. Additionally, our authentication efficiency on the tag side is 2H (two hash calculations), which outperforms most of previously reported solutions based on hash, and the tag stores only two vectors (one is k-bit and the other j-bit). Copyright © 2015 John Wiley & Sons, Ltd.
Please use this identifier to cite or link to this item: