A proposed RFID authentication protocol based on two stages of authentication

被引:5
|
作者
Alqarni, Abdulhadi [1 ]
Alabdulhafith, Maali [1 ]
Sampalli, Srinivas [1 ]
机构
[1] Dalhousie Univ, Halifax, NS B3H 4R2, Canada
来源
5TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS / THE 4TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE / AFFILIATED WORKSHOPS | 2014年 / 37卷
关键词
RFID security; RFID privacy; RFID authentication protocols;
D O I
10.1016/j.procs.2014.08.075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security and privacy vulnerabilities in RFID authentication protocols may affect RFID users by revealing their identification information especially in Healthcare systems. Previous researches in RFID authentication protocols have mainly focused on authenticating the real tag's secret key and identifier, which may help attackers directly obtain these important values. Therefore, in this paper, we present new initialization (IA) and termination (TA) stages of an RFID authentication protocol that improves the RFID security and privacy by authenticating the tag and the server without using the real tag's values (secret key and identifier). If the tag and the server pass the initial stage of authentication (IA), Any authentication protocol can be applied to send and receive the real identification values between them. (C) 2014 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license.
引用
收藏
页码:503 / 510
页数:8
相关论文
共 50 条
  • [21] XTEA based Secure Authentication Protocol for RFID Systems
    Khan, Gul N.
    Yu, Jack
    Yuan, Fei
    2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
  • [22] A Novel ECC-based RFID Authentication Protocol
    Fang Mingwei
    Wu Junjun
    Zhang Xinfang
    Chen Hong
    ADVANCED MATERIALS AND COMPUTER SCIENCE, PTS 1-3, 2011, 474-476 : 1764 - +
  • [23] Hierarchical ECC-Based RFID Authentication Protocol
    Batina, Lejla
    Seys, Stefaan
    Singelee, Dave
    Verbauwhede, Ingrid
    RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 183 - 201
  • [24] RFID Mutual Authentication Protocol based on Synchronized Secret
    Kim, Hyunsung
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (04): : 37 - 49
  • [25] RFID mutual authentication protocol based on chaos key
    Zhang Nan
    Zhang Jianhua
    Yang Jun
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1519 - 1523
  • [26] Scalable authentication protocol in RFID-based systems
    Ren, Xuping
    Zhang, Haiping
    Li, Yunfa
    You, Xindong
    Ren, Xuping, 1600, Transport and Telecommunication Institute, Lomonosova street 1, Riga, LV-1019, Latvia (18): : 131 - 138
  • [27] RFID mutual authentication protocol based on synchronized secret
    Kim, H. (kim@kiu.ac.kr), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (07):
  • [28] Design of a mutual authentication protocol for RFID based on ECC
    Department of Computer and Information Engineering, Heze University, Heze
    Shandong
    274015, China
    不详
    Shandong
    274015, China
    Open Autom. Control Syst. J., 1 (1532-1536):
  • [29] SKINNY-Based RFID Lightweight Authentication Protocol
    Xiao, Liang
    Xu, He
    Zhu, Feng
    Wang, Ruchuan
    Li, Peng
    SENSORS, 2020, 20 (05)
  • [30] Hash-based RFID Mutual Authentication Protocol
    Liu, Yang
    Peng, Yu
    Wang, Bailing
    Qu, Yun
    Bai, Xuefengi
    Yuan, Xinling
    Yin, Zelong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 183 - 194