RFID Authentication and Communication Protocol Based on the Dynamic Active Tag ID and Key

Article Preview

Abstract:

The reliability of Radio Frequency Identification (RFID) mechanism is disturbed by illegal tracking and information intercepted.The paper proposed a new active RFID authentication protocol based on the dynamic tag ID and encryption key,which transforms the tag ID using chaotic transformation during authentication and communication between the reader and tags,and realizes mutual authentication of the reader and tags.Through the analysis of security, the protocol not only can ensure the integrity, fresh and confidentiality of data, but also can effectively prevent illegal tracking labels and replay attack.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1913-1919

Citation:

Online since:

July 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Wang Shao-hui, Wang Gao-li. Analysis of Passive Attack on RFID Authentication Protocol ULAP [J]. Computer Engineering, Beijing, 36(2010) 17-19.

Google Scholar

[2] Wang Yiwei, Zhao Yuehua, LI Xiaocong. RFID Authentication Scheme Based on EPC-C1G2 Standard [J]. Computer Engineering, Beijing, 36 (2010) 153-154, 157.

Google Scholar

[3] Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash- Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, Beijing, 46(2009) 583-592.

Google Scholar

[4] Denoia, Lynn A., Olsen, Anne L. RFID and Application Security. Journal of Research and Practice in Information Technology, Beijing, 41(2009) 209-221.

Google Scholar

[5] Duncan McFarlane, Sanjay Sarma, Jin Lung Chirn, C. Y Wong, Kevin Ashton. Auto ID Systems and Intelligent Manufacturing Control. Engineering Applications of Artificial Intelligence, Beijing, 16(2003) 365-376.

DOI: 10.1016/s0952-1976(03)00077-0

Google Scholar

[6] Deng Miaolei, Wang Yulei, Qui Gang. Authentication Protocol for RFID without Back-end Database [J]. Journal of Beijing University of Posts and Telecommunications, Beijing, 32(2009) 59-62, 67.

Google Scholar

[7] Alex X. Liu, LeRoy A. Bailey. PAP: A Privacy and Authentication Protocol for Passive RFID Tags[J]. Computer Communications, 32(2009) 1194-1199.

DOI: 10.1016/j.comcom.2009.03.006

Google Scholar

[8] Deng Miao-lei, MA Jian-feng, Zhou Li-hua. Design of Anonymous Authentication Protocol for RFID[J]. Journal on Communications, Beijing, 30(2009) 20-26.

Google Scholar

[9] Deng Miao-lei, Huang Zhao-he, Lu Zhibo. 'Secure RFID Authentication Protocol for EPCGen2[J]. Computer Science, Chongqing, 37(2010) 115-117.

Google Scholar

[10] Xie Chuan. RFID Authentication Protocol based on Hash Function and Key Array[J]. Journal of Computer Applications, Beijing, 31(2011) 805 -807, 811.

DOI: 10.3724/sp.j.1087.2011.00805

Google Scholar

[11] Qian Ping, Wu Meng. A Security RFID Authentication Method Based on Hash Function. Telecommunications Science, Beijing, 10(2011), 109-112.

Google Scholar

[12] Yang Hua, Wang Dong. Hash Function Construction Algorithm Applying to UHF RFID Authentication[J]. Journal of Computer Applications, Cheng du, 31, (2011) 805-807, 811.

Google Scholar

[13] Zhu Yong-Bin, Feng Deng-Guo. Design and Analysis of Cryptographic Protocols for RFID[J]. Chinese Journal of Computers, Beijing, 29(2006) 581-589.

Google Scholar

[14] Deng Miaolei, Huang Zhaohe, Yang Lushan. Data Synchronization of Authentication Protocols[J]. Computers Science, Chongqing, 37(2010) 83-85.

Google Scholar

[15] Tang Jing, Ji Dong-yao. Design and Analysis of Security Protocols for RFID Based on LPN Problem[J]. Journal of Electronics & Information Techoonolgy, Beijing, 31(2009) 439-443.

Google Scholar

[16] Liu Qin-hua, Huo Teng-fei, DengYi-qun. A Random Authentication Scheme Based on Hash Function[J]. Communications Techonology. Beijing, 42 (2009) 59-61.

Google Scholar

[17] Li Jing, XiaYou-ming, Jiang Yi-ting. RFID Authentica- tion Protocol in Conformity with the Gen-2 Standard [J]. Journal of Yunnan University Nationalities, Kunming, 19 (2010) 241-243, 252.

Google Scholar

[18] Yang Jie, Cao Hao, Li Pin. General RFID authentication and authorization protocol model. Journal of Yunnan University Nationalities (Natural Sciences Edition), Kunming, 27 (2007) 107-109, 115.

Google Scholar

[19] Wang Tao. General RFID authentication and authorization protocol model[J]. Computer Engineering and Applictions, Beijing, 44(2008) 57-60.

Google Scholar

[20] Robin Doss, Wanlei Zhou, Saravanan Sundaresan, Shui Yu, Longxiang Gao. A minimum disclosure approach to authentication and privacy in RFID systems[J]. Computer Networks, 56 (2012)3401-3416.

DOI: 10.1016/j.comnet.2012.06.018

Google Scholar

[21] Jung-Sik Cho, Sang-Soo Yeo, Sung Kwon Kim. Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value[J], Computer Communications, 34 (2011)391 -397.

DOI: 10.1016/j.comcom.2010.02.029

Google Scholar

[22] Tong-Lee Lim, Saravanan Sundaresan, Wanlei Zhou. A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Networks, 11 (2013) 383–396.

DOI: 10.1016/j.adhoc.2012.06.015

Google Scholar