Pub. online:1 Jan 2013Type:Research ArticleOpen Access
Volume 24, Issue 1 (2013), pp. 1–12
Wireless communication techniques provide convenience for users to get desired information. Construction and management costs of information provision systems with low computational-ability devices, such as RFID devices, are low so lightweight authentication protocols are required for information security. In this paper, two lightweight authentication protocols are proposed for reliable information provision systems with low computational-ability devices. The first protocol is for public information, and the other ensures that only authorized users can get information.