A proposed RFID authentication protocol based on two stages of authentication

被引:5
|
作者
Alqarni, Abdulhadi [1 ]
Alabdulhafith, Maali [1 ]
Sampalli, Srinivas [1 ]
机构
[1] Dalhousie Univ, Halifax, NS B3H 4R2, Canada
来源
5TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS / THE 4TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE / AFFILIATED WORKSHOPS | 2014年 / 37卷
关键词
RFID security; RFID privacy; RFID authentication protocols;
D O I
10.1016/j.procs.2014.08.075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security and privacy vulnerabilities in RFID authentication protocols may affect RFID users by revealing their identification information especially in Healthcare systems. Previous researches in RFID authentication protocols have mainly focused on authenticating the real tag's secret key and identifier, which may help attackers directly obtain these important values. Therefore, in this paper, we present new initialization (IA) and termination (TA) stages of an RFID authentication protocol that improves the RFID security and privacy by authenticating the tag and the server without using the real tag's values (secret key and identifier). If the tag and the server pass the initial stage of authentication (IA), Any authentication protocol can be applied to send and receive the real identification values between them. (C) 2014 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license.
引用
收藏
页码:503 / 510
页数:8
相关论文
共 50 条
  • [41] A scalable and untraceable authentication protocol for RFID
    Seo, Youngjoon
    Lee, Hyunrok
    Kim, Kwangjo
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 252 - 261
  • [42] A Secure and Efficient RFID Authentication Protocol
    Yang, Xin
    Yang, Rui-ke
    INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 417 - 421
  • [43] An Enhanced Ultralightweight RFID Authentication Protocol
    Yeh, Tzu-Chang
    Wu, Chia-Sheng
    JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING, 2009, : 799 - 804
  • [44] Study on RFID Authentication Protocol Theory
    Qi Yong
    Yao Qingsong
    Chen Ying
    Zhong Xiao
    CHINA COMMUNICATIONS, 2011, 8 (01) : 65 - 71
  • [45] Secure and Scalable RFID Authentication Protocol
    Fernandez-Mir, Albert
    Castella-Roca, Jordi
    Viejo, Alexandre
    DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, 2011, 6514 : 231 - 243
  • [46] Research of an Improved RFID Authentication Protocol
    Yu, W. J.
    Zhang, Y. W.
    Tu, Z. Y.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 510 - 512
  • [47] A Highly Scalable RFID Authentication Protocol
    Wu, Jiang
    Stinson, Douglas R.
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 360 - 376
  • [48] A lightweight security authentication protocol for RFID
    Guosheng Zhao
    Hongqi Bao
    Jian Wang
    Peer-to-Peer Networking and Applications, 2025, 18 (3)
  • [49] Secure Authentication Protocol for RFID Systems
    Khan, Gul N.
    Moessner, Markus B.
    2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
  • [50] RFID authentication protocol design methodology
    Cai, QingLing
    Zhan, Yiju
    Yang, Jian
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (02) : 91 - 103