Design and Analysis of a Low-Cost Mutual Authentication Protocol for RFID

Article Preview

Abstract:

This document analyzes the security drawback of the Hash-based algorithm authentication protocols which is frequently used in low-cost RFID systems, and proposes a lightweight mutual authentication protocol. In the proposed protocol, all authenticated information is encrypted , the location privacy is also provided by refreshing an identifier of a tag in each session and lost massages can be recovered from many attacks such as spoofing attacks. The comparison result of the simulation experiment and the formal correctness proof of the proposed authentication protocol is based on BAN logic. It shows that the proposed protocol in this article greatly enhance the capability of verifiability, confidentiality and integrality, it also corrects the existing Hash-based protocol secure deficiency so that it is more suitable for low-cost RFID systems than those existing ones.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2255-2261

Citation:

Online since:

March 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Shen J, Wang J, Mei Y, et al. Privacy Models for RFID Authentication Protocols[J]. 2013. pp.391-397.

Google Scholar

[2] JUELS A, RIVEST R, SZYDLO M. The blocker tag: Selective blocking of RFID tags for consumer privacy[C]/Proceeding of the 8th ACM Conference on Computer and Communication Security. New York: ACM, 2003: 103-111.

DOI: 10.1145/948109.948126

Google Scholar

[3] PEDRO P L, JULIO C H C, JUAN M, et al. RFID system: A survey on security threats and proposed solutions[J]. Lecture Notes in Computer Science, 2006, 42(17): 159-170.

Google Scholar

[4] A. Juels and R. Pappu, Squealing euros: Privacy protection in RFID-enabled banknotes. In proceedings of Financial Cryptography-FC'03, (2003).

DOI: 10.1007/978-3-540-45126-6_8

Google Scholar

[5] S. A. Weis, S. E. Sarma, S. A. Weis and D. W. Engels. Security and privacy Aspects of Low-Cost Radio Frequency Identification Systems. First International Conference on Security in Pervasive Computing, 2003. http: /theory. lcs. mit. edu/sweis/spc-rfid. pdf.

DOI: 10.1007/978-3-540-39881-3_18

Google Scholar

[6] A. Juels, R. L. Rivest and M. Szudlo. The Blocker Tag: Selective Blocking of RFID tags for Consumer Privacy. In the 8th ACM Conference on Computer and Communications Security, pp.103-111.

DOI: 10.1145/948109.948126

Google Scholar

[7] Lee C Y, Wu H L, Chang J C. A Dynamic Approach to Hash-Based Privacy-Preserving RFID Protocols[M] Advances in Intelligent Systems and Applications-Volume 2. Springer Berlin Heidelberg, 2013: 15-23.

DOI: 10.1007/978-3-642-35473-1_2

Google Scholar

[8] CHEN Shao-wei, CHEN Rui, LING Li. An improved hash-based RFID two-way security authentication algorithm[J]. Computer Systems and Applications, 2010, 19(3): 67-70.

Google Scholar

[9] SARMA S E, WEI S A, ENGLES D W. Radio-frequency identification: Security risks and challenges[J]. CryptoBytes Technical Newsletter from RSA Laboratories, 2003, 6(1): 2-9.

Google Scholar

[10] LEE S M, HWANG Y J, LEED H, et al. Efficient authentication for low cost RFID System[C]/International Conference on Computational Science and its Applications. Singapore: World Scientific Publish Company, 2005: 619-627.

Google Scholar

[11] HENRICI D, MAULLER P. Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers[C]/International Workshop on Pervasive Computing and Communication. Orlando, USA, 2004: 149-153.

DOI: 10.1109/percomw.2004.1276922

Google Scholar

[12] SEIS A, SAIMA S E, RIVEST R L. Security and privacy aspects of low-cost radio frequency identification System[C]/Proceeding of the 1st International Conference on Security in Pervasive Computing. [S. l. ]: Springer, 2004: 201-212.

DOI: 10.1007/978-3-540-39881-3_18

Google Scholar

[13] Burrows M, Abadi M, Needham R M. A Logic of authentication[J]. ACM Transactions on Computer Systems, 1989, 8(1): 233-271.

Google Scholar

[14] Comparison of various Security Protocols in RFID. International Journal of Computer Applications (0975 – 8887), Volume 24– No. 7, June (2011).

Google Scholar

[15] Henrici and Paul Muller. Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. PerSec04 at IEEE PerCom, (2004).

DOI: 10.1109/percomw.2004.1276922

Google Scholar