A proposed RFID authentication protocol based on two stages of authentication

被引:5
|
作者
Alqarni, Abdulhadi [1 ]
Alabdulhafith, Maali [1 ]
Sampalli, Srinivas [1 ]
机构
[1] Dalhousie Univ, Halifax, NS B3H 4R2, Canada
关键词
RFID security; RFID privacy; RFID authentication protocols;
D O I
10.1016/j.procs.2014.08.075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security and privacy vulnerabilities in RFID authentication protocols may affect RFID users by revealing their identification information especially in Healthcare systems. Previous researches in RFID authentication protocols have mainly focused on authenticating the real tag's secret key and identifier, which may help attackers directly obtain these important values. Therefore, in this paper, we present new initialization (IA) and termination (TA) stages of an RFID authentication protocol that improves the RFID security and privacy by authenticating the tag and the server without using the real tag's values (secret key and identifier). If the tag and the server pass the initial stage of authentication (IA), Any authentication protocol can be applied to send and receive the real identification values between them. (C) 2014 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license.
引用
收藏
页码:503 / 510
页数:8
相关论文
共 50 条
  • [1] Vulnerability of an RFID authentication protocol proposed in at SecUbiq 2005
    Kwon, Daesung
    Han, Daewan
    Lee, Jooyoung
    Yeom, Yongjin
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 262 - 270
  • [2] An RFID Authentication Protocol with Flexible Path Authentication
    Moriyama, Daisuke
    2013 IEEE INTERNATIONAL CONFERENCE ON RFID-TECHNOLOGIES AND APPLICATIONS (RFID-TA), 2013,
  • [3] RFID lightweight authentication protocol based on PRF
    Jin, Yongming
    Wu, Qiying
    Shi, Zhiqiang
    Lu, Xiang
    Sun, Limin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (07): : 1506 - 1514
  • [4] ERAP: ECC based RFID Authentication Protocol
    Ahamed, Sheikh Iqbal
    Rahman, Farzana
    Hoque, Md. Endadul
    12TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2008, : 219 - 225
  • [5] On the Security of an ECC Based RFID Authentication Protocol
    Babaheidarian, Parisa
    Delavar, Mahshid
    Mohajeri, Javad
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 111 - 114
  • [6] ECC-Based RFID Authentication Protocol
    Xing-Chun Yang
    Chun-Xiang Xu
    Chao-Rong Li
    JournalofElectronicScienceandTechnology, 2020, 18 (04) : 320 - 329
  • [7] Authentication protocol based on key array for RFID
    Ding, Zhi-Guo
    Guo, Li
    Wang, Yu-Jie
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (03): : 722 - 726
  • [8] A Novel RFID Authentication Protocol Based on NTRU
    Shi, Zhicai
    Zhou, Jinzu
    Xia, Yongxiang
    Yu, Chaogang
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 16 - 20
  • [9] Mutual Authentication Protocol for RFID based on ECC
    Zheng, Lijuan
    Xue, Yujuan
    Zhang, Linhao
    Zhang, Rui
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 320 - 323
  • [10] ECC-Based RFID Authentication Protocol
    Yang X.-C.
    Xu C.-X.
    Li C.-R.
    Journal of Electronic Science and Technology, 2020, 18 (04) : 320 - 329