An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection

被引:0
|
作者
Shen, Jian [1 ,2 ]
Tan, Haowen [2 ]
Zheng, Yuhui [2 ]
Ji, Sai [2 ]
Wang, Jin [2 ]
机构
[1] Nanjing Univ Informat Sci Technol, Sch Comp & Software, Jiangsu Engn Ctr Network Monitoring, Nanjing 210044, Peoples R China
[2] Nanjing Univ Informat Sci Technol, Jiangsu Technol Engn Ctr Meteorol Sensor Network, Nanjing 210044, Jiangsu, Peoples R China
关键词
RFID; de-synchronization attack; ID updating; SECURITY;
D O I
10.3233/978-1-61499-484-8-2070
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RFID authentication has many security and privacy issues due to the lightweight operation. Many research achievements in RFID focus on strengthening the entire system and solving the security problems. Recently, a hash-based RFID security protocol with the purpose of updating the identifier of the tag in both the reader side and the tag side was proposed. However, there exists inherent risk in the ID-updating when the adversary blocks the message, where the backend processing system (BPS) cannot recognize the tag due to desynchronization of the identifier in last several sessions. In this paper, we propose an enhanced ID-updating hash-based RFID authentication protocol with strong privacy protection, in which ID-updating is able to resist de-synchronization attack. The possible feedbacks in our protocol are taken into consideration. Our proposed protocol is proved to be effective and secure in real applications.
引用
收藏
页码:2070 / 2079
页数:10
相关论文
共 50 条
  • [31] MUTUAL AUTHENTICATION PROTOCOL BASED ON TAG ID NUMBER UPDATING FOR LOW-COST RFID
    Gu, Yonghao
    Wu, Weiming
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 548 - 551
  • [32] A New RFID Secure Authentication Protocol Based on Hash
    Li Hai-lin
    Xu Peng-fei
    PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 429 - 432
  • [33] ID Updating-Based RFID Mutual Authentication Protocol for Low-Cost Tags
    Li Jian
    Song Danjie
    Guo Xiaojing
    Xie Feng
    Peng Yong
    CHINA COMMUNICATIONS, 2011, 8 (07) : 122 - 127
  • [34] An Efficient RFID Authentication Protocol Providing Strong Privacy and Security
    Shen, Jian
    Tan, Haowen
    Moh, Sangman
    Chung, Ilyong
    Wang, Jin
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (03): : 443 - 455
  • [35] Hash-Based Password Authentication Protocol Against Phishing and Pharming Attacks
    Kim, Iksu
    Cho, Yongyun
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2015, 31 (01) : 343 - 355
  • [36] RFID authentication protocol for anti-counterfeiting and privacy protection
    Chen, Yung-Chin
    Wang, Wei-Lin
    Hwang, Min-Shiang
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 255 - 259
  • [37] Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
    Cho, Jung-Sik
    Yeo, Sang-Soo
    Kim, Sung Kwon
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 391 - 397
  • [38] Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol
    Da-Zhi Sun
    Ji-Dong Zhong
    Wireless Personal Communications, 2016, 91 : 1085 - 1093
  • [39] Privacy Enhanced Authentication Protocol for RFID Tag System Security
    Yeo, Sang-Soo
    Kwak, Jin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (09): : 1 - 6
  • [40] Research on RFID Security Authentication Protocol Based on HASH Function
    Chen, Zhen-huan
    Pan, Xue-feng
    2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 251 - 255