A proposed RFID authentication protocol based on two stages of authentication

被引:5
|
作者
Alqarni, Abdulhadi [1 ]
Alabdulhafith, Maali [1 ]
Sampalli, Srinivas [1 ]
机构
[1] Dalhousie Univ, Halifax, NS B3H 4R2, Canada
来源
5TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS / THE 4TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE / AFFILIATED WORKSHOPS | 2014年 / 37卷
关键词
RFID security; RFID privacy; RFID authentication protocols;
D O I
10.1016/j.procs.2014.08.075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security and privacy vulnerabilities in RFID authentication protocols may affect RFID users by revealing their identification information especially in Healthcare systems. Previous researches in RFID authentication protocols have mainly focused on authenticating the real tag's secret key and identifier, which may help attackers directly obtain these important values. Therefore, in this paper, we present new initialization (IA) and termination (TA) stages of an RFID authentication protocol that improves the RFID security and privacy by authenticating the tag and the server without using the real tag's values (secret key and identifier). If the tag and the server pass the initial stage of authentication (IA), Any authentication protocol can be applied to send and receive the real identification values between them. (C) 2014 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license.
引用
收藏
页码:503 / 510
页数:8
相关论文
共 50 条
  • [31] Simple mutual authentication protocol for RFID
    Renault, Eric
    Bournerdassi, Selma
    TENCON 2007 - 2007 IEEE REGION 10 CONFERENCE, VOLS 1-3, 2007, : 1252 - +
  • [32] Cryptanalysis of the LCSS RFID Authentication Protocol
    Cao, Tianjie
    Shen, Peng
    Bertino, Elisa
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 305 - +
  • [33] An Enhanced Authentication Protocol for RFID Systems
    Hosseinzadeh, Mehdi
    Ahmed, Omed Hassan
    Ahmed, Sarkar Hasan
    Trinh, Cuong
    Bagheri, Nasour
    Kumari, Saru
    Lansky, Jan
    Huynh, Bao
    IEEE ACCESS, 2020, 8 (08): : 126977 - 126987
  • [34] An authentication protocol in mobile RFID environment
    Sun, Hung-Min
    Lu, Chen-En
    Chen, Shuai-Min
    TENCON 2007 - 2007 IEEE REGION 10 CONFERENCE, VOLS 1-3, 2007, : 1143 - +
  • [35] Analysis of an Improved RFID Authentication Protocol
    LI Heng GAO Fei XUE Yanming FENG ShuoBeijing Institute of TechnologyBeijing China
    微计算机信息, 2010, 26 (32) : 129 - 130+190
  • [36] Design and Analysis for RFID Authentication Protocol
    Zhang, Zhen
    Zhou, Shijie
    Luo, Zongwei
    PROCEEDINGS OF THE ICEBE 2008: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, 2008, : 574 - +
  • [37] Lightweight Bidirectional Authentication Protocol for RFID
    He, Jiaqi
    Peng, Changgen
    Fu, Zhangjie
    Xu, Dequan
    Tang, Hanlin
    Computer Engineering and Applications, 2023, 59 (18) : 268 - 277
  • [38] A Lightweight Authentication Protocol for Mobile RFID
    Pan, Tao
    Zuo, Kai-Zhong
    Wang, Tao-Chun
    Deng, Chun-Hong
    International Journal of Network Security, 2024, 26 (02) : 190 - 199
  • [39] Enhancements to a Lightweight RFID Authentication Protocol
    Zhang, Xiaowen
    Zhang, Zhanyang
    Wei, Xinzhou
    ICEBE 2009: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2009, : 454 - +
  • [40] Authentication Protocol in Mobile RFID Network
    Yang, Ming Hour
    Luo, Jia-Ning
    2009 FOURTH INTERNATIONAL CONFERENCE ON SYSTEMS (ICONS), 2009, : 108 - +