Exploring the RFID mutual authentication domain

被引:3
|
作者
Mohsin S.M. [1 ]
Khan I.A. [2 ]
Abrar Akber S.M. [3 ]
Shamshirband S. [4 ,5 ]
Chronopoulos A.T. [6 ,7 ]
机构
[1] Department of Computer Science, Virtual University of Pakistan, Lahore
[2] Department of Computer Science, COMSATS Institute of Information Technology, Islamabad
[3] School of Computer Science and Technology, Huazhong University of Science and Technology (HUST), Wuhan
[4] Department for Management of Science and Technology Development, Ton Duc Thang University, Ho Chi Minh City
[5] Faculty of Information Technology, Ton Duc Thang University, Ho Chi Minh City
[6] Department of Computer Science, University of Texas at San Antonio, San Antonio, TX
[7] (Visiting Faculty) Department of Computer Engineering & Informatics, University of Patras, Rio
关键词
back-end server; mutual authentication; reader; RFID system; security; tag;
D O I
10.1080/1206212X.2018.1533614
中图分类号
学科分类号
摘要
Mutual Authentication is the initial and the most significant line of defense in any open and trusted network system. Weaknesses in mutual authentication protocol may lead to eavesdropping, unauthorized access to the tag or reader data, Denial of Service attack, counterfeiting attack, de-synchronization attack, location tracking, cloning attack, timing attack, man-in-the-middle attack, spoofing attack, and many more. As a result of continuous focus on research of mutual authentication protocols for Radio Frequency Identification (RFID) systems, numerous solutions to address the security issues of RFID system have been proposed. A Comprehensive survey of existing state-of-the-art RFID mutual authentication protocols is presented in this paper. The ultimate objective of this survey paper is to categorize the existing RFID mutual authentication protocols on the basis of their working principle along with their strengths and weaknesses. This categorization of RFID mutual authentication protocols will be beneficial for new researchers to have a quick overview and understanding of the domain and will serve as an input to devise more effective and efficient algorithms for RFID mutual authentication. © 2018 Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:127 / 141
页数:14
相关论文
共 50 条
  • [1] Lightweight Mutual RFID Authentication
    Malek, Behzad
    Miri, Ali
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [2] RFID mutual authentication protocols
    Piramuthu, Selwyn
    DECISION SUPPORT SYSTEMS, 2011, 50 (02) : 387 - 393
  • [3] A Mutual Authentication Protocol for RFID
    Wei, Chia-Hui
    Hwang, Min-Shiang
    Chin, Augustin Yeh-hao
    IT PROFESSIONAL, 2011, 13 (02) : 20 - 24
  • [4] Simple mutual authentication protocol for RFID
    Renault, Eric
    Bournerdassi, Selma
    TENCON 2007 - 2007 IEEE REGION 10 CONFERENCE, VOLS 1-3, 2007, : 1252 - +
  • [5] Mutual Authentication Protocols for RFID Systems
    Omer, Ashrar A.
    Thomas, Johnson P.
    Zhu, Ling
    INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING, 2008, 5 (04) : 348 - 365
  • [6] Efficient Ultralightweight RFID Mutual Authentication
    Huang, Yu-Chung
    Jiang, Jehn-Ruey
    2014 IEEE INTERNATIONAL CONFERENCE (ITHINGS) - 2014 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) - 2014 IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL-SOCIAL COMPUTING (CPS), 2014, : 102 - 108
  • [7] Universally Composable RFID Mutual Authentication
    Su, Chunhua
    Santoso, Bagus
    Li, Yingjiu
    Deng, Robert H.
    Huang, Xinyi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (01) : 83 - 94
  • [8] Mutual Authentication Protocols for RFID Systems
    Ashrar A.Omer
    Johnson P.Thomas
    International Journal of Automation & Computing, 2008, (04) : 348 - 365
  • [9] Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
    Braun, Michael
    Meyer, Ulrike
    Wetzel, Susanne
    INFORMATION SECURITY THEORY AND PRACTICES: SECURITY AND PRIVACY OF PERVASIVE SYSTEMS AND SMART DEVICES, 2010, 6033 : 122 - +
  • [10] The RFID Mutual Authentication scheme Based on FCC and OTP Authentication
    Chen, Chunling
    Wang, Yang
    Yu, Han
    Qiang, Xiao-Hui
    2016 IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS WIRELESS BROADBAND (ICUWB2016), 2016,