期刊文献+

An Efficient and Secure Authentication Protocol for RFID Systems 被引量:1

An Efficient and Secure Authentication Protocol for RFID Systems
原文传递
导出
摘要 The use of radio frequency identification (RFID) tags may cause privacy violation of users carrying an RFID tag. Due to the unique identification number of the RFID tag, the possible privacy threats are information leakage of a tag, traceability of the consumer, denial of service attack, replay attack and impersonation of a tag, etc. There are a number of challenges in providing privacy and security in the RFID tag due to the limited computation, storage and communication ability of low-cost RFID tags. Many research works have already been conducted using hash functions and pseudorandom numbers. As the same random number can recur many times, the adversary can use the response derived from the same random number for replay attack and it can cause a break in location privacy. This paper proposes an RFID authentication protocol using a static identifier, a monotonically increasing timestamp, a tag side random number and a hash function to protect the RFID system from adversary attacks. The proposed protocol also indicates that it requires less storage and computation than previous existing RFID authentication protocols but offers a larger range of security protection. A simulation is also conducted to verify some of the privacy and security properties of the proposed protocol. The use of radio frequency identification (RFID) tags may cause privacy violation of users carrying an RFID tag. Due to the unique identification number of the RFID tag, the possible privacy threats are information leakage of a tag, traceability of the consumer, denial of service attack, replay attack and impersonation of a tag, etc. There are a number of challenges in providing privacy and security in the RFID tag due to the limited computation, storage and communication ability of low-cost RFID tags. Many research works have already been conducted using hash functions and pseudorandom numbers. As the same random number can recur many times, the adversary can use the response derived from the same random number for replay attack and it can cause a break in location privacy. This paper proposes an RFID authentication protocol using a static identifier, a monotonically increasing timestamp, a tag side random number and a hash function to protect the RFID system from adversary attacks. The proposed protocol also indicates that it requires less storage and computation than previous existing RFID authentication protocols but offers a larger range of security protection. A simulation is also conducted to verify some of the privacy and security properties of the proposed protocol.
机构地区 Faculty of Computing
出处 《International Journal of Automation and computing》 EI 2012年第3期257-265,共9页 国际自动化与计算杂志(英文版)
关键词 Radio frequency identification (RFID) SECURITY PRIVACY TIMESTAMP authentication protocol Radio frequency identification (RFID), security, privacy, timestamp, authentication protocol
  • 相关文献

参考文献10

  • 1Menezes A,van Oorschot P,Vanstone S.Handbook of Applied Cryptography[]..1996
  • 2Henrici D,Muller P.Hash-based enhancement of location Privacy for radio frequency identification devices using varying identifiers[].Proceedings of t he nd IEEE Annual Conference on Pervasive Computing and Communications Workshops( PERCOMW’ ).2004
  • 3Ari Juels.RFID Security and Privacy:A Research Survey[].Journal on Selected Areas in Communications.2006
  • 4PIRAMUTHU S.HB and related lightweight authentication protocols for secure RFID tag/reader authentication[].Collaborative Electronic Commerce Technology and Research.2006
  • 5Munilla J,Peinado A.A further step in the HB-family of lightweight authentication protocols[].Computer Networks.2007
  • 6Song B,Mitchell C.RFID Authentication Protocol for Low-cost Tags[].Procof the st ACM Conference on Wireless Network Security.2008
  • 7H. Gilbert,M. Robshaw,H. Sibert."An active attack against HB+–a provably secure lightweight authentication protocol,"[].IEEE Electron Device Letters.2005
  • 8Julien BRINGER,Herv‘e CHABANNE a,nd Emmanuelle DOTTAX.HB++: a Lightweight Authentication Protocol Secure against Some Attacks[].Proceedings of the Second International Workshop on Security Privacy and Trust in Pervasive and Ubiquitous Computing (Sec Per U‘).2006
  • 9D. Molnar,D. Wagner.Privacy and security in library RFID: Issues, practices, and architectures[].Proceedings of the th ACM Conference on Computer and Commu- nications Security.2004
  • 10K. Rhee,J. Kwak,S. Kim et al.Challenge-response based RFID authentication protocol for distributed database environment[].Proc of the nd International Conference on Security in Pervasive Computing (SPC ).2005

同被引文献1

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部