RFID Mutual Authentication Protocols Using Key Exchange Based on Hash Functions

被引:0
|
作者
Jang, Seung-Jae [1 ]
Jung, Young-Hoon [1 ]
Min, So-Yeon [2 ]
Lee, Keun-Wang [3 ]
Jun, Moon-Seog [1 ]
机构
[1] Soongsil Univ, Dept Comp Sci, Seoul 156743, South Korea
[2] Seoil Univ, Dept Internet Informat, Seoul 131702, South Korea
[3] Chungwoon Univ, Dept Multimedia Sci, Hongseong 350701, South Korea
来源
关键词
RFID; Authentication; Key Exchange; Hash; XOR;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A RFID system is a key technology used to create a ubiquitous society through non-contact radio identification technology, expected to provide us with information far above time and space. However, several security issues including a matter of privacy have been raised on account of restricted features of RFID communication environment. A variety of studies have been underway to bring solutions to them, but existing studies require excessive processing capabilities for security problems, tags and back-end database. To solve out this problem, this paper suggests mutual authentication RFID protocols that can guarantee safety from spoofing and re-transfer attack and also reduce the number of comparative operations in the back-end database, with the use of hash functions. XOR operation and key exchange.
引用
收藏
页码:246 / +
页数:3
相关论文
共 50 条
  • [41] ANTI-CLONING AND SECURE RFID MUTUAL AUTHENTICATION PROTOCOLS
    Peng, Peng
    Zhao, Yiming
    2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), 2011, : 379 - 384
  • [42] Lightweight Mutual Authentication Protocols for Low Cost RFID Tags
    AlSahly, Norah
    Al-Rodhaan, Mznah
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2015, 10 (02): : 61 - 71
  • [43] An Improved Authentication Protocol Based on One-Way Hash Functions and Diffie-Hellman Key Exchange
    Holbl, Marko
    Welzer, Tatjana
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 894 - 898
  • [44] A case against currently used hash functions in RFID protocols
    Feldhofer, Martin
    Rechberger, Christian
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 372 - +
  • [45] Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs for RFID Systems
    Assidi, Hafsa
    Ayebie, Edoukou Berenger
    Souidi, El Mamoun
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 : 267 - 283
  • [46] The Research on Mutual authentication Protocol for RFID System Based on Combined Symmetric Key
    Jiang, Jiya
    Liu, Tong
    Shi, Yanqing
    Guo, Jianwei
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON INFORMATION, BUSINESS AND EDUCATION TECHNOLOGY (ICIBET 2013), 2013, 26 : 136 - 139
  • [47] Yet another attack on mutual authentication and key exchange protocols for low power wireless communications
    Chang, Chin-Chen
    Lin, Keng-Chu
    IMECS 2006: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, 2006, : 959 - +
  • [48] Security Verification for Authentication and Key Exchange Protocols
    Otat, Haruki
    Kiyomotot, Shinsaku
    Tanakat, Toshiaki
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 1 - 11
  • [49] SEVERAL PRACTICAL PROTOCOLS FOR AUTHENTICATION AND KEY EXCHANGE
    LIM, CH
    LEE, PJ
    INFORMATION PROCESSING LETTERS, 1995, 53 (02) : 91 - 96
  • [50] Security Verification for Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 507 - 512