Research on Multiple Security Authentication Protocol in RFID System

Article Preview

Abstract:

Weak security of RFID system is concerned by more and more people because of the fast development of internet of things. Some existing RFID authentications protocols begin to be analyzed, such as Mutual three-pass authentication, randomized Hash-Lock, which has some problem of being difficult to resist a variety of network attacks such as forgery tag attacks and a new bidirectional security authentication protocol,A multiple security authentication protocol is proposed to overcome the disadvantage of being vulnerable to cyber attacks. Analysis shows that this approach is of good security and privacy, low cost, and high efficiency.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

770-773

Citation:

Online since:

October 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Juels A. RFID security and privacy: A research survey[J]. IEEE Journal on Selected Areas in Communications, 2004, 24(2): 381-394.

DOI: 10.1109/jsac.2005.861395

Google Scholar

[2] Sarma S, Weis S, Engels D. White paper: RFID systems, security and privacy implications, MIT-AUTOID-WH-014[R]. Auto-ID Center, MIT, (2002).

Google Scholar

[3] Hyun-Seok Kirn, Jung-Hyun Oh, and Jin-Young Choi, Analysis of the RFID Security Protocol for Secure Smart Home Network. International Conference on Hybrid Information Technology(ICHIT06). 2006(2): 356-363.

DOI: 10.1109/ichit.2006.253634

Google Scholar

[4] Dimitriou Tassos. A light weight RFID protocol to protect against traceability and cloning attacks[C]/Conference on Security and Privacy for Emerging Areas in Communication Networks-SecureComm. 2005: 137-145.

DOI: 10.1109/securecomm.2005.4

Google Scholar

[5] Tri Van Le, Mike Burnmester, Breno de Medeiros, Universally compostable and forward secure RFID authentication and authenticated key exchange in: The Proceedings of the Second ACM Symposium on Information, Computer and Communications Security, 2007: 242-252.

DOI: 10.1145/1229285.1229319

Google Scholar

[6] Elias Levy, Iván Arce. New Threats and Attacks on the World Wide Web. IEEE Security&Privacy. 2006. 3.

Google Scholar

[7] A. Juels. RFID Security and Privacy: A Research Survey[J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2): 351-394.

DOI: 10.1109/jsac.2005.861395

Google Scholar

[8] S. Inoue and H. Yasuura. RFID privacy using user-controllable uniqueness [R]. In RFID Privacy Workshop, MIT, Massachusetts, USA, November (2003).

Google Scholar

[9] D. M. Konidala, Z. Kim, and K. Kim, A Simple and Cost-Effective RFID Tag-Reader Mutual Authentication Scheme, presented at Pre-Proc. of International Conference on RFID Security 2007 (RFIDSec 07), Malaga, Spain, (2007).

Google Scholar