2016
DOI: 10.3390/app6080215
|View full text |Cite
|
Sign up to set email alerts
|

Mutual Authentication Protocol for Role-Based Access Control Using Mobile RFID

Abstract: Abstract:The Internet has become the main transmission media in modern information systems due to the popularization of information technology and the rapid development of network technology. To use the Internet, we need complete security mechanisms which include requirements such as integrity, security and privacy to ensure the legal user can login to a remote server to get the service and resources they need. The radio frequency identification (RFID) is a very convenient technology with the property of non-c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 11 publications
0
7
0
Order By: Relevance
“…There have also been studies on mobile RFID networks, such as constructing a hierarchical wireless master‐slave RFID reader architecture for smart home service systems [13], proposing localization algorithms for tracking humans [12] or objects [14] in specific areas, suggesting anti‐collision solutions for interrogation between readers and tags in high‐density areas [15,16], and ensuring the security of mobile RFID systems based on authentication [17]. However, there have been very few studies related to data cleaning, particularly clustering‐based data filtering in mobile RFID networks.…”
Section: Related Workmentioning
confidence: 99%
“…There have also been studies on mobile RFID networks, such as constructing a hierarchical wireless master‐slave RFID reader architecture for smart home service systems [13], proposing localization algorithms for tracking humans [12] or objects [14] in specific areas, suggesting anti‐collision solutions for interrogation between readers and tags in high‐density areas [15,16], and ensuring the security of mobile RFID systems based on authentication [17]. However, there have been very few studies related to data cleaning, particularly clustering‐based data filtering in mobile RFID networks.…”
Section: Related Workmentioning
confidence: 99%
“…In this way, the model had no solution to deal with this problem. There are more examples of RBAC and ABAC merger as well as RBAC with other systems in which the researcher proposed some fascinating techniques in the form of hybrid models [10,11,26,27].…”
Section: Rbac and Abac Mergermentioning
confidence: 99%
“…The HBEC protocol overcomes the security flaws in EECC protocol to provide high security, even though the extra hash function adds more overhead to the computation, which should be addressed for the network scalability. B.Chen [14] proposed a role-based access control (RBAC) protocol for mobile RFID, to enable user privacy, role, and access control through the back-end server based on a certification mechanism. RBAC assigns role classes as keys to control the information and the number of times each reader can read a tag.…”
Section: Simple-weight Protocolsmentioning
confidence: 99%