An Efficient and Secure Authentication Protocol for RFID Systems

被引:0
|
作者
Monzur Morshed [1 ]
Anthony Atkins [1 ]
机构
[1] Faculty of Computing, Engineering and Technology, Staffordshire University
关键词
Radio frequency identification (RFID); security; privacy; timestamp; authentication protocol;
D O I
暂无
中图分类号
TP391.44 [];
学科分类号
0811 ; 081101 ; 081104 ; 1405 ;
摘要
The use of radio frequency identification (RFID) tags may cause privacy violation of users carrying an RFID tag. Due to the unique identification number of the RFID tag, the possible privacy threats are information leakage of a tag, traceability of the consumer, denial of service attack, replay attack and impersonation of a tag, etc. There are a number of challenges in providing privacy and security in the RFID tag due to the limited computation, storage and communication ability of low-cost RFID tags. Many research works have already been conducted using hash functions and pseudorandom numbers. As the same random number can recur many times, the adversary can use the response derived from the same random number for replay attack and it can cause a break in location privacy. This paper proposes an RFID authentication protocol using a static identifier, a monotonically increasing timestamp, a tag side random number and a hash function to protect the RFID system from adversary attacks. The proposed protocol also indicates that it requires less storage and computation than previous existing RFID authentication protocols but offers a larger range of security protection. A simulation is also conducted to verify some of the privacy and security properties of the proposed protocol.
引用
收藏
页码:257 / 265
页数:9
相关论文
共 50 条
  • [1] An Efficient and Secure Authentication Protocol for RFID Systems
    Morshed, Md. Monzur
    Atkins, Anthony
    Yu, Hong-Nian
    [J]. INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING, 2012, 9 (03) : 257 - 265
  • [2] An Efficient and Secure Authentication Protocol for RFID Systems
    Monzur Morshed
    Anthony Atkins
    [J]. International Journal of Automation & Computing., 2012, 9 (03) - 265
  • [3] A Secure and Efficient RFID Authentication Protocol
    Yang, Xin
    Yang, Rui-ke
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 417 - 421
  • [4] Secure Authentication Protocol for RFID Systems
    Khan, Gul N.
    Moessner, Markus B.
    [J]. 2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
  • [5] An Authentication Protocol for Secure and Efficient RFID Communication
    Li, Jie
    Wang, Yunfeng
    Jiao, Baoying
    Xu, Yong
    [J]. PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON LOGISTICS SYSTEMS AND INTELLIGENT MANAGEMENT, VOLS 1-3, 2010, : 1648 - +
  • [6] A Secure and Efficient Authentication Protocol for Passive RFID Tags
    Kolias, Constantinos
    Kolias, Vasilis
    Kambourakis, Georgios
    [J]. 2009 6TH INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS (ISWCS 2009), 2009, : 36 - +
  • [7] A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems
    Poulopoulos, George
    Markantonakis, Konstantinos
    Mayes, Keith
    [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 706 - 711
  • [8] XTEA based Secure Authentication Protocol for RFID Systems
    Khan, Gul N.
    Yu, Jack
    Yuan, Fei
    [J]. 2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
  • [9] An Efficient Mutual Authentication Protocol for RFID Systems
    Lin, Iuon-Chang
    Luo, Rui-Kun
    Tsao, Shih-Chang
    [J]. HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 3, PROCEEDINGS, 2009, : 41 - +
  • [10] AN EFFICIENT MUTUAL AUTHENTICATION PROTOCOL FOR RFID SYSTEMS
    Lin, Iuon-Chang
    Wang, Chi-Wei
    Luo, Rui-Kun
    You, Hsin-Chiang
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (06): : 3097 - 3106