Next Article in Journal
SEPIM: Secure and Efficient Private Image Matching
Next Article in Special Issue
A Self-Testing Platform with a Foreground Digital Calibration Technique for SAR ADCs
Previous Article in Journal
Sharp Switching Characteristics of Single Electron Transistor with Discretized Charge Input
Previous Article in Special Issue
Heterodyne Angle Deviation Interferometry in Vibration and Bubble Measurements
Article Menu

Export Article

Open AccessArticle
Appl. Sci. 2016, 6(8), 215;

Mutual Authentication Protocol for Role-Based Access Control Using Mobile RFID

Department of Information and Communication, Southern Taiwan University of Science and Technology, Tainan 71005, Taiwan
Department of Multimedia and Entertainment Science, Southern Taiwan University of Science and Technology, Tainan 71005, Taiwan
Author to whom correspondence should be addressed.
Academic Editor: Teen-Hang Meen
Received: 31 May 2016 / Revised: 17 July 2016 / Accepted: 21 July 2016 / Published: 29 July 2016
Full-Text   |   PDF [1430 KB, uploaded 29 July 2016]   |  


The Internet has become the main transmission media in modern information systems due to the popularization of information technology and the rapid development of network technology. To use the Internet, we need complete security mechanisms which include requirements such as integrity, security and privacy to ensure the legal user can login to a remote server to get the service and resources they need. The radio frequency identification (RFID) is a very convenient technology with the property of non-contact reading. It uses the tag embedded in the object to identify the information quickly. Now, more and more devices are equipped with the RFID reader. Hence, the user can use the RFID reader embedded in the mobile device through a wireless network to read the information on the tag and then use the service which is called Mobile RFID. Compared to traditional RFID, the characteristic of mobility makes the reading more flexible. It can deal with the events in real-time and undertake the process faster and more efficiently. The major security problem of Mobile RFID is privacy, which is also a consideration when constructing a Mobile RFID Mechanism. In this paper, we propose a secure authentication mechanism which uses the authenticated delegating mechanism in Mobile RFID to enable the reader to get the specific role authority through a back-end database server. The reader has to undertake mutual authentication with the back-end database server and the tag. Then, it can protect the information and limit the access times of the reader to achieve privacy. View Full-Text
Keywords: mobile RFID; role-based access control; mutual authentication mobile RFID; role-based access control; mutual authentication

Graphical abstract

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Chen, B.-C.; Yang, C.-T.; Yeh, H.-T.; Lin, C.-C. Mutual Authentication Protocol for Role-Based Access Control Using Mobile RFID. Appl. Sci. 2016, 6, 215.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Appl. Sci. EISSN 2076-3417 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top