An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection

被引:0
|
作者
Shen, Jian [1 ,2 ]
Tan, Haowen [2 ]
Zheng, Yuhui [2 ]
Ji, Sai [2 ]
Wang, Jin [2 ]
机构
[1] Nanjing Univ Informat Sci Technol, Sch Comp & Software, Jiangsu Engn Ctr Network Monitoring, Nanjing 210044, Peoples R China
[2] Nanjing Univ Informat Sci Technol, Jiangsu Technol Engn Ctr Meteorol Sensor Network, Nanjing 210044, Jiangsu, Peoples R China
关键词
RFID; de-synchronization attack; ID updating; SECURITY;
D O I
10.3233/978-1-61499-484-8-2070
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RFID authentication has many security and privacy issues due to the lightweight operation. Many research achievements in RFID focus on strengthening the entire system and solving the security problems. Recently, a hash-based RFID security protocol with the purpose of updating the identifier of the tag in both the reader side and the tag side was proposed. However, there exists inherent risk in the ID-updating when the adversary blocks the message, where the backend processing system (BPS) cannot recognize the tag due to desynchronization of the identifier in last several sessions. In this paper, we propose an enhanced ID-updating hash-based RFID authentication protocol with strong privacy protection, in which ID-updating is able to resist de-synchronization attack. The possible feedbacks in our protocol are taken into consideration. Our proposed protocol is proved to be effective and secure in real applications.
引用
收藏
页码:2070 / 2079
页数:10
相关论文
共 50 条
  • [11] A new hash-based authentication protocol for RFID using varying identifiers
    Li, Shu
    Yang, Xi
    Liang, Ping-yuan
    SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 2112 - 2116
  • [12] Improve Healthcare Safety Using Hash-Based Authentication Protocol for RFID Systems
    Baashirah, Rania
    Abuzneid, Abdelshakour
    Tammineedi, Akhil
    Mathew, Maneesha
    Bandaru, Neelam
    Delair, Pulkit
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 800 - 805
  • [13] Research on Hash-Based low-cost RFID Security Authentication Protocol
    Huo Lin
    Jiang Yilin
    Hu Liangqing
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1524 - 1530
  • [14] An Efficient Lightweight RFID Authentication Protocol with Strong Trajectory Privacy Protection
    Wei Zhang
    Sanya Liu
    Shengming Wang
    Baolin Yi
    Longkai Wu
    Wireless Personal Communications, 2017, 96 : 1215 - 1228
  • [15] An Efficient Lightweight RFID Authentication Protocol with Strong Trajectory Privacy Protection
    Zhang, Wei
    Liu, Sanya
    Wang, Shengming
    Yi, Baolin
    Wu, Longkai
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 1215 - 1228
  • [16] Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol
    Jeong, Hanjae
    Won, Dongho
    Kim, Seungjoo
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (05) : 1845 - 1858
  • [17] A Novel Hash-Based RFID Grouping Authentication Protocol on Tag Groups and Multiple Readers
    Shen, Jian
    Tan, Haowen
    Ren, Yongjun
    Zheng, Yuhui
    Wang, Jin
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 2162 - 2171
  • [18] An Efficient Hash-based RFID Grouping Authentication Protocol Providing Missing Tags Detection
    Tan, Haowen
    Choi, Dongmin
    Kim, Pankoo
    Pan, Sungbum
    Chung, Ilyong
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (02): : 481 - 488
  • [19] Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol
    Safkhani, Masoumeh
    Pens-Lopez, Pedro
    Hernandez-Castro, Julio Cesar
    Bagheri, Nasour
    JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 2014, 259 : 571 - 577
  • [20] Lightweight Hash-Based Authentication Protocol for Smart Grids
    Kook, Sangjin
    Kim, Keunok
    Ryu, Jihyeon
    Lee, Youngsook
    Won, Dongho
    SENSORS, 2024, 24 (10)