An authentication protocol for low-cost RFID tags

被引:0
|
作者
Wei, Chia-Hui [2 ]
Hwang, Min-Shiang [1 ]
Chin, Augustin Yeh-Hao [2 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[2] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
关键词
authentication; RFID; security; privacy; denial of service; mobile communication; KEY AGREEMENT; ROBUST;
D O I
暂无
中图分类号
G2 [信息与知识传播];
学科分类号
05 ; 0503 ;
摘要
Radio Frequency Identification (RFID) system can be read by radio wave within several metres without having direct contact. Many research focus on improving security and privacy problem. Recently, Rizomiliotis et al. point out that Song-Mitchell protocol is vulnerable to the denial of service attack, since the attacker can easily modify the data to make the server and the tag out of synchronisation without detection. However, this paper pointed out that Rizomiliotis et al.'s modification was not correct. Therefore, we designed a new authentication scheme, which inherits the advantage of Song-Mitchell protocol and Rizomiliotis et al.'s protocol, along with the assumption that the insecure channel exists between the reader and the server. Finally, this paper provides a security analysis to comparison with other protocols.
引用
下载
收藏
页码:208 / 223
页数:16
相关论文
共 50 条
  • [1] RFID Authentication Protocol for Low-cost RFID Tags
    Kang, BooJoong
    Kim, Hye Seon
    Kim, Eui-Hyung
    Kim, Hyong-Shik
    Im, Eul Gyu
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (06): : 2041 - 2060
  • [2] RFID Authentication Protocol for Low-cost Tags
    Song, Boyeon
    Mitchell, Chris J.
    WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 140 - 147
  • [3] An Efficient RFID Authentication Protocol for Low-cost Tags
    Liu, Yanfei
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 180 - 185
  • [4] A Novel RFID Authentication Protocol for Low-Cost Tags
    Wu, Dan
    Chen, Geng
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 43 - 46
  • [5] A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
    Abughazalah, Sarah
    Markantonakis, Konstantinos
    Mayes, Keith
    SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2013, 405 : 102 - 110
  • [6] A hidden mutual authentication protocol for low-cost RFID tags
    Li, Jung-Shian
    Liu, Kun-Hsuan
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (09) : 1196 - 1211
  • [7] Low-cost authentication protocol for passive, computation capable RFID tags
    Gul N. Khan
    Markus Moessner
    Wireless Networks, 2015, 21 : 565 - 580
  • [8] Low-cost authentication protocol for passive, computation capable RFID tags
    Khan, Gul N.
    Moessner, Markus
    WIRELESS NETWORKS, 2015, 21 (02) : 565 - 580
  • [9] An Ultra-Lightweight Secure RFID Authentication Protocol for Low-Cost Tags
    Kumar, Sanjeev
    Banka, Haider
    Kaushik, Baijnath
    Sharma, Surbhi
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, : 803 - 818
  • [10] A privacy-preserving lightweight authentication protocol for low-cost RFID tags
    Yu, Shucheng
    Ren, Kui
    Lou, Wenjing
    2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 2939 - +