An Optimized RFID Unidirectional Authentication Method

Article Preview

Abstract:

To solve the problems of consumers security and privacy, an optimized RFID unidirectional authentication method is proposed, comparing with other asymmetric cryptography, this method has stronger security, shorter key length, less computation and so on. This method achieves one-way authentication between tag and reader-writer, and allow the labels to automatically update the key to improve the performance of RFID authentication, and also can enhance security through updating keys. This method allows the label to update its own name and private key, so can prevent attackers tracking them, so as to solve the privacy problem of the tags.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1734-1738

Citation:

Online since:

January 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Miles S B, Sarma S E, Williams J R. RFID Technology and Applications[M]. New York, USA: Cambridge University Press, (2008).

Google Scholar

[2] Weis S, Sarma S, Rivest R, et al. Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems[C]/Proc. of the 1st International Conference on Security in Pervasive Computing. Boppard, Germany: [s. n. ], (2003).

DOI: 10.1007/978-3-540-39881-3_18

Google Scholar

[3] Zhang Hengshan, Chang Jun, Guan Huisheng, A multi-encryption-technic based authentication method for RFID [J]. Computer Engineering, 2011, 37(1): 134-136.

Google Scholar

[4] Chen Yalin, Chou Jue-Sam, Sun Hung-Min. A Novel Mutualauthentication Scheme Based on Quadratic Residues for RFID Systems[J]. Computer Networks, 2008, 52(12): 2373-2380.

DOI: 10.1016/j.comnet.2008.04.016

Google Scholar

[5] Yeh Tzu-Chang, Wu Chien-Hung, Tseng Yuh-Min. Improvement of the RFID Authentication Scheme Based on Quadratic Residues[J]. Computer Communications, 2011, 34(3): 337-341. SECG, Elliptic Curve Cryptography, SEC 1, (2000).

DOI: 10.1016/j.comcom.2010.05.011

Google Scholar