An enhanced authentication scheme in mobile RFID system

被引:16
|
作者
Chiou, Shin-Yan [1 ,2 ,3 ]
Chang, Shan Yen [1 ]
机构
[1] Chang Gung Univ, Coll Engn, Dept Elect Engn, 259 Wen Hwa 1st Rd, Taoyuan, Taiwan
[2] Linkou Chang Gung Mem Hosp, Dept Nucl Med, Taoyuan, Taiwan
[3] Chang Gung Univ, Ctr Biomed Engn, Taoyuan, Taiwan
关键词
Mobile RFID; Authentication; Privacy; QUADRATIC RESIDUES; PROTOCOL; PRIVACY;
D O I
10.1016/j.adhoc.2017.12.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The popularization of wireless networks and mobile applications has increased the importance of RFID technologies. However, since wireless networks does not guarantee transmission channel security, putting private user information at risk for unintentional disclosure. Previous research has introduced a security mechanism to provide privacy and authentication. This mechanism is based on quadratic residue, does not require a secure channel and fits EPC Class-1 Gen-2 specifications. However, this mechanism cannot resist replay attacks, and lacks an efficient means of its server is not able to find determining validating values, making it difficult to implement. This paper proposes an improvement scheme that uses virtual IDs and time parameters. It does not need a secure channel, fits EPC Class-1 Gen-2 specifications, is resistant to replay attacks, and can efficiently find validation information. The proposed scheme is applied to mobile devices as a proof of concept for use in wireless/mobile RFID systems. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:1 / 13
页数:13
相关论文
共 50 条
  • [11] An Enhanced Biometric Based RFID Authentication Scheme Defending Against Illegitimate Access
    Ayaz, Umar
    Haq, Tayyaba Abdul
    Taimour, Saba
    Mansoor, Khwaja
    Mahmood, Saba
    [J]. 2018 14TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES (ICET), 2018,
  • [12] Privacy Enhanced Authentication Protocol for RFID Tag System Security
    Yeo, Sang-Soo
    Kwak, Jin
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (09): : 1 - 6
  • [13] Cryptanalysis and improvement of a RFID authentication scheme
    Cao, Tianjie
    Zhang, Yongping
    [J]. Journal of Computational Information Systems, 2009, 5 (04): : 1177 - 1182
  • [14] Secure Authentication and Management Scheme for RFID
    Seo, Dae-Hee
    Baek, Jang-Mi
    Cho, Dong-Sub
    [J]. Q2SWINET'08: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2008, : 106 - 110
  • [15] An Authentication Scheme for Ubiquitous RFID Systems
    Yeh, Kuo-Hui
    Chen, YuShan
    Wang, Fan-Wei
    [J]. RADIO FREQUENCY IDENTIFICATION SYSTEM SECURITY, 2014, 12 : 41 - 50
  • [16] A study on improved RFID authentication scheme
    Seo, Dae-Hee
    Baek, Jang-Mi
    Li, Jiang
    Kang, Soo-Young
    Lee, Im-Yeong
    Oh, Hyung-Geun
    [J]. MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 567 - +
  • [17] A secure authentication scheme for RFID systems
    Dass, Prajnamaya
    Om, Hari
    [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 100 - 106
  • [18] An authentication protocol in mobile RFID environment
    Sun, Hung-Min
    Lu, Chen-En
    Chen, Shuai-Min
    [J]. TENCON 2007 - 2007 IEEE REGION 10 CONFERENCE, VOLS 1-3, 2007, : 1143 - +
  • [19] A Lightweight Authentication Protocol for Mobile RFID
    Pan, Tao
    Zuo, Kai-Zhong
    Wang, Tao-Chun
    Deng, Chun-Hong
    [J]. International Journal of Network Security, 2024, 26 (02) : 190 - 199
  • [20] Authentication Protocol in Mobile RFID Network
    Yang, Ming Hour
    Luo, Jia-Ning
    [J]. 2009 FOURTH INTERNATIONAL CONFERENCE ON SYSTEMS (ICONS), 2009, : 108 - +