An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection

被引:0
|
作者
Shen, Jian [1 ,2 ]
Tan, Haowen [2 ]
Zheng, Yuhui [2 ]
Ji, Sai [2 ]
Wang, Jin [2 ]
机构
[1] Nanjing Univ Informat Sci Technol, Sch Comp & Software, Jiangsu Engn Ctr Network Monitoring, Nanjing 210044, Peoples R China
[2] Nanjing Univ Informat Sci Technol, Jiangsu Technol Engn Ctr Meteorol Sensor Network, Nanjing 210044, Jiangsu, Peoples R China
关键词
RFID; de-synchronization attack; ID updating; SECURITY;
D O I
10.3233/978-1-61499-484-8-2070
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RFID authentication has many security and privacy issues due to the lightweight operation. Many research achievements in RFID focus on strengthening the entire system and solving the security problems. Recently, a hash-based RFID security protocol with the purpose of updating the identifier of the tag in both the reader side and the tag side was proposed. However, there exists inherent risk in the ID-updating when the adversary blocks the message, where the backend processing system (BPS) cannot recognize the tag due to desynchronization of the identifier in last several sessions. In this paper, we propose an enhanced ID-updating hash-based RFID authentication protocol with strong privacy protection, in which ID-updating is able to resist de-synchronization attack. The possible feedbacks in our protocol are taken into consideration. Our proposed protocol is proved to be effective and secure in real applications.
引用
收藏
页码:2070 / 2079
页数:10
相关论文
共 50 条
  • [1] A Hash-Based RFID Security Protocol for Strong Privacy Protection
    Sun, Da-Zhi
    Zhong, Ji-Dong
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2012, 58 (04) : 1246 - 1252
  • [2] A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection
    Lim, Jihwan
    Oh, Heekuck
    Kim, Sangjin
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2008, 4991 : 278 - +
  • [3] Enhanced Hash-Based RFID Mutual Authentication Protocol
    Kim, Hyunsung
    COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 70 - 77
  • [4] Hash-based RFID Mutual Authentication Protocol
    Liu, Yang
    Peng, Yu
    Wang, Bailing
    Qu, Yun
    Bai, Xuefengi
    Yuan, Xinling
    Yin, Zelong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 183 - 194
  • [5] A Lightweight Hash-Based Mutual Authentication Protocol for RFID
    Li, Zhangbing
    Zhong, Xiaoyong
    Chen, Xiaochun
    Liu, Jianxun
    MANAGEMENT OF INFORMATION, PROCESS AND COOPERATION, 2017, 686 : 87 - 98
  • [6] Improvement of the Hash-Based RFID Mutual Authentication Protocol
    Masoud Hadian Dehkordi
    Yousof Farzaneh
    Wireless Personal Communications, 2014, 75 : 219 - 232
  • [7] Research on hash-based RFID security authentication protocol
    Ding, Zhenhua
    Li, Jintao
    Feng, Bo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2009, 46 (04): : 583 - 592
  • [8] Improvement of the Hash-Based RFID Mutual Authentication Protocol
    Dehkordi, Masoud Hadian
    Farzaneh, Yousof
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 75 (01) : 219 - 232
  • [9] A New Hash-Based Enhanced Privacy ID Signature Scheme
    Chen, Liqun
    Dong, Changyu
    El Kassem, Nada
    Newton, Christopher J. P.
    Wang, Yalan
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2024, PT I, 2024, 14771 : 37 - 71
  • [10] A hash-based strong password authentication protocol with user anonymity
    Department of Electrical and Computer Engineering, North Dakota State University, 1411 Centennial Blvd, Fargo, ND 58105, United States
    Int. J. Netw. Secur., 2006, 3 (205-209):