A Kind of Effective Protection of Privacy and Low Cost RFID Security Authentication Protocol

Article Preview

Abstract:

With the gradual application of RFID technology, the problems of privacy security arouse people's great attention. To address the problems of the existing RFID authentication protocol, such as the weakness on security and privacy, the high cost and the un-stabilizing systems performance, this paper puts forward a kind effective protection of privacy and low cost RFID security authentication protocol, analyses the security and performance of this protocol. This protocol can not only effectively solve the problems of replay attacks, location privacy attack and data synchronization, but also greatly use the Reader computing resources to reduce the cost of system construction, so it is appropriate for the application of RFID system.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1882-1886

Citation:

Online since:

July 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Habibi M H, Gardeshi M,Alaghband MR.Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard[J].International Journal of UbiComp(IJU),2011,2(1):1-13.

DOI: 10.5121/iju.2011.2101

Google Scholar

[2] Lee Y,Batina L,Singel ee D.Low-cost Untraceable Authentication Protocols for RFID [C]/Proe of the 3rd ACM Conference on Wireless Network Security(W iSec2010).New York:Hoboken,2010:55-64.

DOI: 10.1145/1741866.1741877

Google Scholar

[3] Spiekermann S,Evdokimov S.Critical RFID Privacy-enhancing Technologies.IEEE Security and Privacy,2009,7(2):56-62.

DOI: 10.1109/msp.2009.31

Google Scholar

[4] Cho J S,Yeo S S,Kim S K.Securing against Brute-force Attack:a hash-based RFID Mutual Authentieation Protocol Using a Secret Value[J].Computer Communications,2011,34(3): 391-397.

DOI: 10.1016/j.comcom.2010.02.029

Google Scholar

[5] Phan R C W,W u J,Ouafi K,et a1.Privacy Analysis of Forward and Backward Untraceable RFID Authentication Schemes[J].Wireless Personal Communications,2010,53(2):1-13.

DOI: 10.1007/s11277-010-0001-0

Google Scholar

[6] ISO/IEC.1 8000-3:2008 Information Technology Radio Frequ-ency Identification for Item Management[S].2008.

Google Scholar

[7] Batina L, Lee Y K, Seys S, et al. Privacy Preserving ECC-based Grouping Proofs for RFID[C]/Proc. of the 13th International Conference on Information Security. Berlin, Germany: Springer-Verlag, (2010).

DOI: 10.1007/978-3-642-18178-8_14

Google Scholar

[8] Lv Chao, Li Hui, Ma Jianfeng, et al. Security Analysis of aPrivacy-preserving ECC-based Grouping-proof Protocol[J]. Journal of Convergence Information Technology, 2011, 6(3): 113-119.

DOI: 10.4156/jcit.vol6.issue3.13

Google Scholar

[9] Lin Qiping, Zhang Fangguo. ECC-based Grouping-Proof RFID for Inpatient Medication Safety[J]. Journal of Medical Systems, 2011, 35(3): 369-375.

DOI: 10.1007/s10916-011-9757-3

Google Scholar