A New RFID Authentication Protocol with Ownership Transfer in an Insecure Communication Environment

被引:10
|
作者
Wang, Chih-Hung [1 ]
Chin, Shan [1 ]
机构
[1] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi, Taiwan
关键词
RFID Authentication Scheme; Ownership Transfer; Wireless Environment; Network Security;
D O I
10.1109/HIS.2009.100
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
During recent years, RFID technology raises many privacy and security concerns. However, most previous works provided authentication protocols by the assumption of secure channel between the reader and the database. But this assumption is not suitable for wireless environment. In 2005, Yang et al. proposed a scheme in which the channel between the reader and the database is assumed to be insecure. Unfortunately, Yang et al.'s scheme cannot achieve some critical security requirements. Due to above reason, we propose a new authentication protocol against all possible attacks and this method is secure even if the channel between the reader and the database may suffer from the attacks of interception, eavesdropping and masquerade. Additionally, the proposed scheme also supports the ownership transfer property Inspired by Osaka et al.'s and Lei-Cao's schemes.
引用
收藏
页码:486 / 491
页数:6
相关论文
共 50 条
  • [1] A New Authentication RFID Protocol with Ownership Transfer
    Gui, Yi-Qi
    Zhang, Jie
    [J]. 2013 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2013): FUTURE CREATIVE CONVERGENCE TECHNOLOGIES FOR NEW ICT ECOSYSTEMS, 2013, : 359 - 364
  • [2] New authentication/ownership transfer protocol for RFID objects
    Aghili, Seyed Farhad
    Mala, Hamid
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 49
  • [3] A secure rfid authentication and ownership transfer protocol in serverless environment
    Lin, Iuon-Chang
    Hsu, Hung-Huei
    [J]. ICIC Express Letters, 2012, 6 (06): : 1429 - 1433
  • [4] A study on secure RFID authentication protocol in insecure communication
    Park, Jang-Su
    Kang, Soo-Young
    Lee, Im-Yeong
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 133 - 143
  • [5] A novel RFID authentication protocol with ownership transfer
    Sun, Dong
    Liu, Dan
    [J]. Journal of Digital Information Management, 2013, 11 (06): : 476 - 481
  • [6] RFID authentication protocol using ID synchronization in insecure communication
    Park, Jang-Su
    Lee, Im-Yeong
    [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2006, : 664 - +
  • [7] A Cloud-based RFID Authentication Protocol with Insecure Communication Channels
    Xiao, Hannan
    Alshehri, Awatif Ali
    Christianson, Bruce
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 332 - 339
  • [8] A Novel Authentication Protocol Enabling RFID Tags Ownership Transfer
    Wang, Hong
    Yang, Xiaolong
    Huang, Qiong
    Long, Keping
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 855 - 860
  • [9] An efficient RFID authentication protocol supporting tag ownership transfer
    Jialiang, He
    Dantong, Ouyang
    Youjun, Xu
    Yu, Shang
    [J]. International Journal of Advancements in Computing Technology, 2012, 4 (04) : 244 - 253
  • [10] A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation
    Fernandez-Mir, Albert
    Trujillo-Rasua, Rolando
    Castella-Roca, Jordi
    Domingo-Ferrer, Josep
    [J]. RFID SECURITY AND PRIVACY, 2012, 7055 : 147 - 162