A New Hash-Based Authentication Protocol for RFID Using Varying Identifiers

Article Preview

Abstract:

This article proposed a new security protocol with satisfying the lightweight requirements of the security of RFID system. Using varying identifiers, the protocol can resist Forward attack, Traffic analysis and Tracking attack, Replay attack. The Back-end Server holds the new identifier and last identifier for every Tag can keep database synchronization. Each Tag store a unique Key that is the secret information which also store in the Back-end Server. Use the Key, the protocol can implement mutual authentication between Back-end Server and Tag. Then the paper compared the proposed protocol with the typical protocols in security, effective and cost. The results demonstrate that the protocol can effectively solve the security problem of RFID systems.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2112-2116

Citation:

Online since:

February 2013

Export:

Price:

[1] Hanwei Wu; Sihan Qing; Honglei Li. Security analysis and improvement to digital library RFID protocol[C]. 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), pp.2834-2837, 21-23 April (2012).

DOI: 10.1109/cecnet.2012.6201873

Google Scholar

[2] Arazi B. Message Authentication in Computationally Constrained Environments[J]. IEEE Transactions on Mobile Computing, 8(7) : 968-974, (2009).

DOI: 10.1109/tmc.2009.40

Google Scholar

[3] Sarma S E, Weis S A, Engels D W. RFID systems and security and privacy implications[C]. Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) . Lectures Notes in Computer Science 2523, 454-469, (2003).

DOI: 10.1007/3-540-36400-5_33

Google Scholar

[4] Weis S A, Sarma S E, Rivest R L, et al. Security and privacy aspects of low-cost radio frequency identification systems[C]. Proceedings of the 1st International Conference on Security in Pervasive Computing . Lectures Notes in Compute Science 2802, 201-212, (2004).

DOI: 10.1007/978-3-540-39881-3_18

Google Scholar

[5] Ohkubo M, Suzuki K, Kinoshita S. Cryptographic approach to Privacy-Friendly, tags[Z]. In RFID Privacy workshop , MIT, MA, USA. November (2003).

Google Scholar

[6] Henrici D, Muller P. Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers[C]. Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW' 04), Washington : IEEE, 149~153, (2004).

DOI: 10.1109/percomw.2004.1276922

Google Scholar

[7] Lee S M, Hwang Y J, Lee D H, et al. Efficient authentication for low-cost RFID systems[C]. Proceedings of the International Conference on Computational Science and It's Applications (ICCSA 2005). Lectures Notes in Computer Science 3480. 619~627, (2005).

DOI: 10.1007/11424758_65

Google Scholar

[8] Peris-Lopez P, Castro J C H, Esteves-Tapiador J M , et al. An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks[C]. EUC Workshops, 781-794, (2007).

DOI: 10.1007/978-3-540-77090-9_71

Google Scholar

[9] Zhou Jun, Xu Yong-jun, Li Xiao-wei. A Security Protocol Designed with Proxy for RFID. Proceedings of 2010 Conference on Dependable Computing (CDC'2010). November 20-22, (2010).

Google Scholar