Skip to main content
Erschienen in: Wireless Personal Communications 4/2018

26.09.2018

An Improved RFID Authentication Protocol Based on Group Anonymous Model

verfasst von: Ping Wang, Zhiping Zhou

Erschienen in: Wireless Personal Communications | Ausgabe 4/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Aiming at the security and privacy, and authentication efficiency shortages of existing RFID authentication protocol, an improved scheme is proposed based on Alavi et al.’s protocol. Firstly, in order to resist against replay attack, we add the timestamp generator to the reader side and use hash function to encrypt the reader identification, the random number and timestamp generated by the reader; meanwhile, to solve the data integrity problem in the original scheme, the reader matches the decrypted data with the server side message to ensure that it can detect if the data is tampered with by the attacker. Finally, the improved group anonymous authentication model is used to improve the back-end server’s authentication efficiency. Theoretical analysis and experimental results show that the improved protocol effectively solves the security problems and reduces the back-end server’s authentication time. In addition, this paper simulates the impact of group number on system privacy level and authentication efficiency through experiments. In practical applications, the group number can be adjusted appropriately according to different privacy and efficiency requirements, so the privacy and authentication efficiency of the system will be well-balanced.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Irshad, A., Sher, M., Nawaz, O., et al. (2017). A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme. Multimedia Tools and Applications, 76(15), 16463–16489.CrossRef Irshad, A., Sher, M., Nawaz, O., et al. (2017). A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme. Multimedia Tools and Applications, 76(15), 16463–16489.CrossRef
2.
Zurück zum Zitat Khan, I., Chaudhry, S. A., Sher, M., et al. (2018). An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data. The Journal of Supercomputing, 74(8), 3685–3703.CrossRef Khan, I., Chaudhry, S. A., Sher, M., et al. (2018). An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data. The Journal of Supercomputing, 74(8), 3685–3703.CrossRef
3.
Zurück zum Zitat Akgün, M., & Çaǧlayan, M. U. (2015). Providing destructive privacy and scalability in RFID systems using PUFs. Ad Hoc Networks, 32(9), 32–42.CrossRef Akgün, M., & Çaǧlayan, M. U. (2015). Providing destructive privacy and scalability in RFID systems using PUFs. Ad Hoc Networks, 32(9), 32–42.CrossRef
4.
Zurück zum Zitat Su, C., Santoso, B., Li, Y., et al. (2017). Universally composable RFID mutual authentication. IEEE Transactions on Dependable and Secure Computing, 14(1), 83–94. Su, C., Santoso, B., Li, Y., et al. (2017). Universally composable RFID mutual authentication. IEEE Transactions on Dependable and Secure Computing, 14(1), 83–94.
5.
Zurück zum Zitat Srivastava, K., Awasthi, A. K., Kaul, S. D., et al. (2015). A hash based mutual RFID tag authentication protocol in telecare medicine information system. Journal of Medical Systems, 39(1), 153–157.CrossRef Srivastava, K., Awasthi, A. K., Kaul, S. D., et al. (2015). A hash based mutual RFID tag authentication protocol in telecare medicine information system. Journal of Medical Systems, 39(1), 153–157.CrossRef
6.
Zurück zum Zitat Li, C. T., Weng, C. Y., & Lee, C. C. (2015). A secure RFID tag authentication protocol with privacy preserving in telecare medicine information system. Journal of Medical Systems, 39(8), 77–84.CrossRef Li, C. T., Weng, C. Y., & Lee, C. C. (2015). A secure RFID tag authentication protocol with privacy preserving in telecare medicine information system. Journal of Medical Systems, 39(8), 77–84.CrossRef
7.
Zurück zum Zitat Wu, F., Xu, L., Kumari, S., et al. (2018). A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. Journal of Ambient Intelligence and Humanized Computing, 9(4), 919–930.CrossRef Wu, F., Xu, L., Kumari, S., et al. (2018). A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. Journal of Ambient Intelligence and Humanized Computing, 9(4), 919–930.CrossRef
8.
Zurück zum Zitat Cho, J. S., Jeong, Y. S., & Park, S. O. (2015). Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Computers and Mathematics with Applications, 69(1), 58–65.MATHCrossRef Cho, J. S., Jeong, Y. S., & Park, S. O. (2015). Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Computers and Mathematics with Applications, 69(1), 58–65.MATHCrossRef
9.
Zurück zum Zitat Dehkordi, M. H., & Farzaneh, Y. (2014). Improvement of the hash-based RFID mutual authentication protocol. Wireless Personal Communications, 75(1), 219–232.CrossRef Dehkordi, M. H., & Farzaneh, Y. (2014). Improvement of the hash-based RFID mutual authentication protocol. Wireless Personal Communications, 75(1), 219–232.CrossRef
10.
Zurück zum Zitat Alavi, S. M., Baghery, K., & Abdolmaleki, B. (2015). Traceability analysis of recent RFID authentication protocols. Wireless Personal Communications, 83(3), 1663–1682.CrossRef Alavi, S. M., Baghery, K., & Abdolmaleki, B. (2015). Traceability analysis of recent RFID authentication protocols. Wireless Personal Communications, 83(3), 1663–1682.CrossRef
11.
Zurück zum Zitat Fan, K., Gong, Y., Liang, C., et al. (2016). Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Security and Communication Networks, 9(16), 3095–3104.CrossRef Fan, K., Gong, Y., Liang, C., et al. (2016). Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Security and Communication Networks, 9(16), 3095–3104.CrossRef
12.
Zurück zum Zitat Aghili, S. F., Ashouri-Talouki, M., & Mala, H. (2018). DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT. The Journal of Supercomputing, 74(1), 509–525.CrossRef Aghili, S. F., Ashouri-Talouki, M., & Mala, H. (2018). DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT. The Journal of Supercomputing, 74(1), 509–525.CrossRef
13.
Zurück zum Zitat Farash, M. S., Nawaz, O., Mahmood, K., et al. (2016). A provably secure RFID authentication protocol based on elliptic curve for healthcare environments. Journal of Medical Systems, 40(7), 165–171.CrossRef Farash, M. S., Nawaz, O., Mahmood, K., et al. (2016). A provably secure RFID authentication protocol based on elliptic curve for healthcare environments. Journal of Medical Systems, 40(7), 165–171.CrossRef
14.
Zurück zum Zitat Sundaresan, S., Doss, R., Piramuthu, S., et al. (2015). Secure tag search in RFID systems using mobile readers. IEEE Transactions on Dependable and Secure Computing, 12(2), 230–242.CrossRef Sundaresan, S., Doss, R., Piramuthu, S., et al. (2015). Secure tag search in RFID systems using mobile readers. IEEE Transactions on Dependable and Secure Computing, 12(2), 230–242.CrossRef
15.
Zurück zum Zitat Jannati, H., & Bahrak, B. (2016). Security analysis of an RFID tag search protocol. Information Processing Letters, 116(10), 618–622.CrossRef Jannati, H., & Bahrak, B. (2016). Security analysis of an RFID tag search protocol. Information Processing Letters, 116(10), 618–622.CrossRef
16.
Zurück zum Zitat Pourpouneh, M., Ramezanian, R., & Salahi, F. (2014). An improvement over a server-less RFID authentication protocol. International Journal of Computer Network and Information Security, 7(1), 31–37.CrossRef Pourpouneh, M., Ramezanian, R., & Salahi, F. (2014). An improvement over a server-less RFID authentication protocol. International Journal of Computer Network and Information Security, 7(1), 31–37.CrossRef
17.
Zurück zum Zitat Shahrbabak, M. M., & Abdolmaleky, S. (2016). SRMAP and ISLAP authentication protocols: Attacks and improvements. IACR Cryptology ePrint Archive, 2016, 731–741. Shahrbabak, M. M., & Abdolmaleky, S. (2016). SRMAP and ISLAP authentication protocols: Attacks and improvements. IACR Cryptology ePrint Archive, 2016, 731–741.
18.
Zurück zum Zitat Shen, J., Tan, H., Zhang, Y., et al. (2017). A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment. Multimedia Tools and Applications, 76(21), 22761C22783. Shen, J., Tan, H., Zhang, Y., et al. (2017). A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment. Multimedia Tools and Applications, 76(21), 22761C22783.
19.
Zurück zum Zitat Avoine, G., Bingöl, M. A., Carpent, X., et al. (2013). Privacy-friendly authentication in RFID systems: on sublinear protocols based on symmetric-key cryptography. IEEE Transactions on Mobile Computing, 12(10), 2037–2049.CrossRef Avoine, G., Bingöl, M. A., Carpent, X., et al. (2013). Privacy-friendly authentication in RFID systems: on sublinear protocols based on symmetric-key cryptography. IEEE Transactions on Mobile Computing, 12(10), 2037–2049.CrossRef
20.
Zurück zum Zitat Li, T., Luo, W., Mo, Z., et al. (2012). Privacy-preserving RFID authentication based on cryptographical encoding. In 2012 Proceedings IEEE INFOCOM (pp. 2174–2182). Li, T., Luo, W., Mo, Z., et al. (2012). Privacy-preserving RFID authentication based on cryptographical encoding. In 2012 Proceedings IEEE INFOCOM (pp. 2174–2182).
21.
Zurück zum Zitat Deng, G., Li, H., Zhang, Y., et al. (2013). Tree-LSHB+: An LPN-based lightweight mutual authentication RFID protocol. Wireless Personal Communications, 72(1), 159–174.CrossRef Deng, G., Li, H., Zhang, Y., et al. (2013). Tree-LSHB+: An LPN-based lightweight mutual authentication RFID protocol. Wireless Personal Communications, 72(1), 159–174.CrossRef
22.
Zurück zum Zitat Avoine, G., Buttyant, L., Holczer, T., et al. (2007). Group-based private authentication. In IEEE international symposium on world of wireless, mobile and multimedia networks (WoWMoM) (pp. 1–6). Avoine, G., Buttyant, L., Holczer, T., et al. (2007). Group-based private authentication. In IEEE international symposium on world of wireless, mobile and multimedia networks (WoWMoM) (pp. 1–6).
23.
Zurück zum Zitat Rahman, F., Hoque, M. E., & Ahamed, S. I. (2017). Anonpri: A secure anonymous private authentication protocol for RFID systems. Information Sciences, 379(2), 195–210.CrossRef Rahman, F., Hoque, M. E., & Ahamed, S. I. (2017). Anonpri: A secure anonymous private authentication protocol for RFID systems. Information Sciences, 379(2), 195–210.CrossRef
24.
Zurück zum Zitat Sun, M. T., Sakai, K., & Ku, W. S. (2016). Private and secure tag access for large-scale RFID systems. IEEE Transactions on Dependable and Secure Computing, 13(6), 657–671.CrossRef Sun, M. T., Sakai, K., & Ku, W. S. (2016). Private and secure tag access for large-scale RFID systems. IEEE Transactions on Dependable and Secure Computing, 13(6), 657–671.CrossRef
25.
Zurück zum Zitat Vaudenay, S. (2007). On privacy models for RFID. In 13th international conference on the theory and application of cryptology and information security (pp. 68–87).CrossRef Vaudenay, S. (2007). On privacy models for RFID. In 13th international conference on the theory and application of cryptology and information security (pp. 68–87).CrossRef
26.
Zurück zum Zitat Cao, T., Chen, X., Doss, R., et al. (2016). RFID ownership transfer protocol based on cloud. Computer Networks, 105(8), 47–59.CrossRef Cao, T., Chen, X., Doss, R., et al. (2016). RFID ownership transfer protocol based on cloud. Computer Networks, 105(8), 47–59.CrossRef
27.
Zurück zum Zitat He, D., & Zeadally, S. (2015). An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet of Things Journal, 2(1), 72–83.CrossRef He, D., & Zeadally, S. (2015). An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet of Things Journal, 2(1), 72–83.CrossRef
28.
Zurück zum Zitat Ibrahim, A., & Dalkilic, G. (2017). Review of different classes of RFID authentication protocols. Wireless Networks, 2017(4), 1–14. Ibrahim, A., & Dalkilic, G. (2017). Review of different classes of RFID authentication protocols. Wireless Networks, 2017(4), 1–14.
Metadaten
Titel
An Improved RFID Authentication Protocol Based on Group Anonymous Model
verfasst von
Ping Wang
Zhiping Zhou
Publikationsdatum
26.09.2018
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5964-2

Weitere Artikel der Ausgabe 4/2018

Wireless Personal Communications 4/2018 Zur Ausgabe

Neuer Inhalt