Secure Authentication Protocol of RFID System Based on Access Control

Article Preview

Abstract:

The security and privacy problem of low-cost RFID system is one of the most difficult conundrums in the RFID research field. A protocol based on access control was proposed in this paper, which used the reader access, partial ID, XOR operation, etc. By using of the reader authority distribution method, the unauthorized tag`s information was prevented give-away and it can avoid the lawful reader attack, location privacy attack, etc. Function of the reader was fully used. At the same time, the back-end database`s load and the time of the tag`s answer were reduced. Compared with several traditional security authentication protocols, this protocol is more security, lower energy consumption and more suitable for low-cost RFID system.

You have full access to the following eBook

Info:

Periodical:

Pages:

1072-1077

Citation:

Online since:

September 2012

Export:

Share:

Citation:

[1] Li yong-zhen, Cho Young-Bok, Um Nam-Kyoung, and Lee Sang-Ho. Security and privacy on authentication protocol for low-cost RFID [C]. Proceedings for 2006 International Conference on Computational Intelligence and Security. Guangzhou, China, November 3-6, 2006, pp.1101-1104.

DOI: 10.1109/iccias.2006.295432

Google Scholar

[2] Zhou xiaoguang, Wang xiaohua. Radio Frequency Identification (RFID) technology principle and application examples [M]. Beijing: Posts & Telecom Press, (2006).

Google Scholar

[3] WEIS S A. Security and privacy in Radio-frequency identification devices [D]. Department of Electrical Engineering and Computer Science of MIT, (2003).

Google Scholar

[4] Enzelleer k. RFID handbook Z: Radio-Frequency Identification Fundamentals and Applications [M]. Second edition. New York: John Wiley and Sons Ltd, (2003).

Google Scholar

[5] Xie chuan. Combination of Hash functions and key array of RFID security authentication protocol. Journal of Computer Applications. 2011, 31(3), p.805~808.

DOI: 10.3724/sp.j.1087.2011.00805

Google Scholar

[6] Chen ruixin, Zou chuanyun, Huang jingwu. RFID cryptographic protocol based on ID change. Application of Electronic Technique. 2009, 35(9), p.157~160.

Google Scholar

[7] Shao qian, Chen yue, Chang zhenhua. Design of RFID tag Ownership Transfer Mode and Protocols. Computer Engineering, 2009: 35(15), p.143~145.

Google Scholar

[8] Ding zhenhua, Li jintao, Feng bo. Research on Hash-Based RFID Security Authentication Protocol. Journal of Computer Research and Development. 2009, 46(4), p.583~592.

Google Scholar

[9] Zhu min. A Survey on Ultra-lightweight Security Mechanism in Low-cost RFID. Computer Knowledge and Technology. 2010: 6(33), p.9221~9224.

Google Scholar

[10] Tsudik G. YA-TRAP, yet another trivial RRID authentication protocol [C] / Proc of the 4th Annual IEEE Int Conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2006, p.640~643.

DOI: 10.1109/percomw.2006.152

Google Scholar