Design and Analysis of a New Mutual Authentication Protocol for RFID

Article Preview

Abstract:

This paper proposes a lightweight mutual authentication protocol for RFID. Based on the simple bit operations, it creates the random number N1 on the tag and the identifier RID on reader to protect the transmission of information, and proves the protocol security at the end. The results show that the proposed protocol can meet the security requirements of confidentiality, integrity, and traceability in RFID applications. Furthermore, the protocol can resist attacks of tracking, eavesdropping, retransmitting and the denial of service, which makes up the security defects mentioned on this paper.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 1006-1007)

Pages:

548-551

Citation:

Online since:

August 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Rieback MR, Bertion T, Crispo B. A new ultra-lightweight RFID authentication protocol providing strong authentication and strong integrity[J], IEEE Transactions in Dependable and Secure Computing, 2011, 4(4): 337-340.

DOI: 10.1109/tdsc.2007.70226

Google Scholar

[2] SARMA S E, WEIS S A, ENGELS D W. RFID systems and security and privacy implications. KALISKI B S, KOC C K, PAAR C[C]/Proceedings of the 4th Intemational Workshop on Cryptographic Hardware and Embedded Systems(CHES2002). Lectures Notes in Computer Science 2523. Berlin: Spnng-Verlag, 2003: 454-469.

DOI: 10.1007/3-540-36400-5_33

Google Scholar

[3] SARMA S E, WEIS S A, ENGELS D W. Radio frequency identification: secure risks and challenges[J]. RSA Laboratories Crypto bytes, 2003, 6(1): 2-9.

Google Scholar

[4] OHKUBO M, SUZUKI K. Hash-chain based forward secure privacy protection scheme for low-cost RFID[C[/Proceedings of the 2004 Symposium on Cryptography and Information Security. Sendai : [s. n. ], 2004: 719-724.

Google Scholar

[5] RHEE K, KWAK J, KIM S, etal. Challenge-response based RFID authentication protocol for distributed database environment. HUTTER D, ULLMANN M. [C]/Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005). Lectures Notes in Computer Science 3450. Berlin: Springer-Verlag, 2005, 70-84.

DOI: 10.1007/978-3-540-32004-3_9

Google Scholar

[6] Heng-shan Zhang, Hui-sheng Guan, Hai-qiang Han. Public key based mutual authentication protocol for RFID system[J]. Computer Engineering and Applications, 2010, 46(5): 69-72. In Chinese.

Google Scholar

[7] Shu-guang Yuan, Hong-yue Dai, Sheng-li Lai. Hash-based RFID Authentication Protocol[J]. Computer Engineering, 2008, 34(12): 141-143. In Chinese.

Google Scholar