RFID Security Authentication Protocol Based on Hash for the Lightweight RFID Systems

Article Preview

Abstract:

In order to solve the RFID authentication protocols, a new mutual authentication protocol based on Hash for the lightweight RFID system is proposed in this paper. Compared with several RFID authentication protocols with the similar structure, the proposed protocol can effectively solve the privacy and security of the RFID system, and it has significant performance advantages. It greatly reduces the amount storage and computation of tags.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2831-2836

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Finkenzeller K. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-field Communication. 3nd Edition. London: John Wiley&Sons, (2010).

DOI: 10.1002/9780470665121

Google Scholar

[2] Lee Y, Batina L, Singel'ee D. Low-cost Untraceable Authentication Protocols for RFID [C]/Proc of the 3rd ACM Conference on Wireless Network Security (WiSee2010). New York: Hoboken, 2010: 55-64.

DOI: 10.1145/1741866.1741877

Google Scholar

[3] SARMA S. E, WEIS S. A, ENGLES D W. Radio frequency identification: secure risks and challenges. RSA Laboratories Crypto-bytes, 2003, 6(1): 2-9.

Google Scholar

[4] Weis S. A, Sarma S. E, Rivest R. L, Engel D.W. Security and privacy aspect of low-cost radio frequency identification systems. In: Hutter D, Muller G, Stephan W, Ullmann M. eds. Proceedings of the 1st International Conference on security in pervasive Computing. Lectures Notes in Computer on security in pervasive Computing. Lectures Notes in Computer Science 2002. Berlin: Springer-Verlag, 2004: 201-212.

DOI: 10.1007/978-3-540-39881-3_18

Google Scholar

[5] Ohkubo M, Suzuki K, Kinoshita S. Hash-chain based forward-secure privacy protection scheme for low-cost RFID. In: Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004), Sendai, 2004: 719-72.

Google Scholar

[6] Henrici D, Muller P. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: Proceedings of the 2nd IEEE Annual conference on Pervasive Computing and Communications Workshops(PERCOMW'04), Washington, DC, USA, 2004: 149-153.

DOI: 10.1109/percomw.2004.1276922

Google Scholar

[7] Mike Burmester TRI VAN LE et al. Universally Composable RFID Identification and Authentication Protocols [J]. ACM transactions on information and system security, 2009, 12_33.

DOI: 10.1145/1513601.1513603

Google Scholar