Blockchain-based Mutual Authentication Security Protocol for Distributed RFID Systems

被引:0
|
作者
Wang, Siye [1 ,2 ]
Zhu, Shaoyi [1 ,3 ]
Zhang, Yanfang [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cyher Secur, Beijing, Peoples R China
关键词
RFID; blockchain; distributed system; security; privacy;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Since radio frequency identification (RFID) technology has been used in various scenarios such as supply chain, access control system and credit card, tremendous efforts have been made to improve the authentication between tags and readers to prevent potential attacks. Though effective in certain circumstances, these existing methods usually require a server to maintain a database of identity related information for every tag, which makes the system vulnerable to the SQL injection attack and not suitable for distributed environment. To address these problems, we now propose a novel blockchain-based mutual authentication security protocol. In this new scheme, there is no need for the trusted third parties to provide security and privacy for the system. Authentication is executed as an unmodifiable transaction based on blockchain rather than database, which applies to distributed RFID systems with high security demand and relatively low real-time requirement. Analysis shows that our protocol is logically correct and can prevent multiple attacks.
引用
收藏
页码:74 / 77
页数:4
相关论文
共 50 条
  • [31] Blockchain-based identity and authentication scheme for MQTT protocol
    Abubakar, Mwrwan Abdelrazig
    Jaroucheh, Zakwan
    Al-Dubai, Ahmed
    Liu, Xiaodong
    [J]. 2021 THE 3RD INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY, ICBCT 2021, 2021, : 73 - 81
  • [32] A Blockchain-based Lightweight Authentication Protocol for Vehicular Platoons
    Carvajal-Roca, Ivan E.
    Shi, Jinming
    Wang, Jian
    [J]. 2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,
  • [33] Blockchain-based batch authentication protocol for Internet of Vehicles
    Bagga, Palak
    Sutrala, Anil Kumar
    Das, Ashok Kumar
    Vijayakumar, Pandi
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 113
  • [34] A Blockchain-Based Mutual Authentication Scheme for Collaborative Edge Computing
    Cheng, Guanjie
    Chen, Yan
    Deng, Shuiguang
    Gao, Honghao
    Yin, Jianwei
    [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 9 (01) : 146 - 158
  • [35] A blockchain-based security system with light cryptography for user authentication security
    Imen Hagui
    Amina Msolli
    Noura ben Henda
    Abdelhamid Helali
    Abdelaziz Gassoumi
    Thanh Phuong Nguyen
    Fredj Hassen
    [J]. Multimedia Tools and Applications, 2024, 83 : 52451 - 52480
  • [36] On the Security of an ECC Based RFID Authentication Protocol
    Babaheidarian, Parisa
    Delavar, Mahshid
    Mohajeri, Javad
    [J]. 2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 111 - 114
  • [37] Security analysis of Kulseng et al.'s mutual authentication protocol for RFID systems
    Yang, Y.
    Gu, J.
    Lv, C.
    Jiang, Q.
    Ma, W.
    [J]. IET INFORMATION SECURITY, 2012, 6 (04) : 239 - 248
  • [38] A blockchain-based security system with light cryptography for user authentication security
    Hagui, Imen
    Msolli, Amina
    ben Henda, Noura
    Helali, Abdelhamid
    Gassoumi, Abdelaziz
    Nguyen, Thanh Phuong
    Hassen, Fredj
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (17) : 52451 - 52480
  • [39] Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems
    Liu, Hong
    Ning, Huansheng
    Zhang, Yan
    He, Daojing
    Xiong, Qingxu
    Yang, Laurence T.
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (07) : 1321 - 1330
  • [40] Hash-based RFID Mutual Authentication Protocol
    Liu, Yang
    Peng, Yu
    Wang, Bailing
    Qu, Yun
    Bai, Xuefengi
    Yuan, Xinling
    Yin, Zelong
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 183 - 194