SRFID: A hash-based security scheme for low cost RFID systems

作者: Walid I. Khedr

DOI: 10.1016/J.EIJ.2013.02.001

关键词:

摘要: Abstract Radio Frequency Identification (RFID) technology is a promising technology. It uses radio waves to identify objects. Through automatic and real-time data acquisition, this can give great benefit various industries by improving the efficiency of their operations. However, ubiquitous has inherited problems in security privacy, due powerful tracking capability tags. This paper proposes new simple, low cost, scalable scheme relying on one-way hash functions synchronized secret information. The proposed provides two steps mutual authentication between backend server tag which does not require secure channel reader complete process. meets requirements for delegation ownership transfer. general idea change ID every read attempt manner. means that attempts like eavesdropping, replay attacks, cloning, tracing, denial service attack, or man-in-the-middle attacks cannot compromise scheme. Our analysis results show outperforms existing schemes terms performance.

参考文章(20)
Jihwan Lim, Heekuck Oh, Sangjin Kim, A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection information security practice and experience. pp. 278- 289 ,(2008) , 10.1007/978-3-540-79104-1_20
Jia Zhai, Chang Mok Park, Gi-Nam Wang, Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification Procedure Computational Science and Its Applications - ICCSA 2006. pp. 296- 305 ,(2006) , 10.1007/11751632_32
Song Han, Vidyasagar Potdar, Elizabeth Chang, Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor Lecture Notes in Computer Science. pp. 227- 238 ,(2007) , 10.1007/978-3-540-74484-9_20
Elif Bilge Kavun, Tolga Yalcin, A lightweight implementation of Keccak hash function for radio-frequency identification applications radio frequency identification security and privacy issues. pp. 258- 269 ,(2010) , 10.1007/978-3-642-16822-2_20
Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia, QUARK: a lightweight hash cryptographic hardware and embedded systems. pp. 1- 15 ,(2010) , 10.1007/978-3-642-15031-9_1
Shijie Zhou, Zhen Zhang, Zongwei Luo, Edward C. Wong, A lightweight anti-desynchronization RFID authentication protocol Information Systems Frontiers. ,vol. 12, pp. 521- 528 ,(2010) , 10.1007/S10796-009-9216-6
Jung-Sik Cho, Sang-Soo Yeo, Sung Kwon Kim, Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value Computer Communications. ,vol. 34, pp. 391- 397 ,(2011) , 10.1016/J.COMCOM.2010.02.029
Jian Shen, Dongmin Choi, Sangman Moh, Ilyong Chung, A Novel Anonymous RFID Authentication Protocol Providing Strong Privacy and Security international conference on multimedia information networking and security. pp. 584- 588 ,(2010) , 10.1109/MINES.2010.128
Boyeon Song, Chris J. Mitchell, RFID authentication protocol for low-cost tags wireless network security. pp. 140- 147 ,(2008) , 10.1145/1352533.1352556