Exploring the RFID mutual authentication domain

被引:3
|
作者
Mohsin S.M. [1 ]
Khan I.A. [2 ]
Abrar Akber S.M. [3 ]
Shamshirband S. [4 ,5 ]
Chronopoulos A.T. [6 ,7 ]
机构
[1] Department of Computer Science, Virtual University of Pakistan, Lahore
[2] Department of Computer Science, COMSATS Institute of Information Technology, Islamabad
[3] School of Computer Science and Technology, Huazhong University of Science and Technology (HUST), Wuhan
[4] Department for Management of Science and Technology Development, Ton Duc Thang University, Ho Chi Minh City
[5] Faculty of Information Technology, Ton Duc Thang University, Ho Chi Minh City
[6] Department of Computer Science, University of Texas at San Antonio, San Antonio, TX
[7] (Visiting Faculty) Department of Computer Engineering & Informatics, University of Patras, Rio
关键词
back-end server; mutual authentication; reader; RFID system; security; tag;
D O I
10.1080/1206212X.2018.1533614
中图分类号
学科分类号
摘要
Mutual Authentication is the initial and the most significant line of defense in any open and trusted network system. Weaknesses in mutual authentication protocol may lead to eavesdropping, unauthorized access to the tag or reader data, Denial of Service attack, counterfeiting attack, de-synchronization attack, location tracking, cloning attack, timing attack, man-in-the-middle attack, spoofing attack, and many more. As a result of continuous focus on research of mutual authentication protocols for Radio Frequency Identification (RFID) systems, numerous solutions to address the security issues of RFID system have been proposed. A Comprehensive survey of existing state-of-the-art RFID mutual authentication protocols is presented in this paper. The ultimate objective of this survey paper is to categorize the existing RFID mutual authentication protocols on the basis of their working principle along with their strengths and weaknesses. This categorization of RFID mutual authentication protocols will be beneficial for new researchers to have a quick overview and understanding of the domain and will serve as an input to devise more effective and efficient algorithms for RFID mutual authentication. © 2018 Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:127 / 141
页数:14
相关论文
共 50 条
  • [31] IBIHOP: Proper privacy preserving mutual RFID authentication
    Peeters, Roel
    Hermans, Jens
    Fan, Junfeng
    Cryptology and Information Security Series, 2013, 11 : 45 - 56
  • [32] Mutual Authentication Based on HECC for RFID Implant Systems
    John, Asha Liza
    Thampi, Sabu M.
    SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 18 - 29
  • [33] A Reliable RFID Mutual Authentication Scheme for Healthcare Environments
    Zhen-Yu Wu
    Lichin Chen
    Ju-Chuan Wu
    Journal of Medical Systems, 2013, 37
  • [34] Design of a mutual authentication protocol for RFID based on ECC
    Department of Computer and Information Engineering, Heze University, Heze
    Shandong
    274015, China
    不详
    Shandong
    274015, China
    Open Autom. Control Syst. J., 1 (1532-1536):
  • [35] RFID mutual authentication protocol based on synchronized secret
    Kim, H. (kim@kiu.ac.kr), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (07):
  • [36] RFID System Mutual Authentication Protocols Based on ECC
    Feng, Li
    Yao, Xuanxia
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 1644 - 1649
  • [37] RFID Mutual Authentication Protocols with Universally Composable Security
    Su, Chunhua
    Li, Yingjiu
    Deng, Robert H.
    RADIO FREQUENCY IDENTIFICATION SYSTEM SECURITY (RFIDSEC'11), 2011, 6 : 35 - 49
  • [38] Lightweight Protocol for Anonymity and Mutual Authentication in RFID Systems
    Rahman, Musfiq
    Sampangi, Raghav V.
    Sampalli, Srinivas
    2015 12TH ANNUAL IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2015, : 910 - 915
  • [39] Mutual Authentication Protocol for RFID Security using NFSR
    Suresh, T.
    Ramakrishnan, M.
    PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2015, : 255 - 259
  • [40] Lightweight Mutual Authentication and Ownership Transfer for RFID Systems
    Kulseng, Lars
    Yu, Zhen
    Wei, Yawen
    Guan, Yong
    2010 PROCEEDINGS IEEE INFOCOM, 2010,