An authentication protocol for low-cost RFID tags

被引:0
|
作者
Wei, Chia-Hui [2 ]
Hwang, Min-Shiang [1 ]
Chin, Augustin Yeh-Hao [2 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[2] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
关键词
authentication; RFID; security; privacy; denial of service; mobile communication; KEY AGREEMENT; ROBUST;
D O I
暂无
中图分类号
G2 [信息与知识传播];
学科分类号
05 ; 0503 ;
摘要
Radio Frequency Identification (RFID) system can be read by radio wave within several metres without having direct contact. Many research focus on improving security and privacy problem. Recently, Rizomiliotis et al. point out that Song-Mitchell protocol is vulnerable to the denial of service attack, since the attacker can easily modify the data to make the server and the tag out of synchronisation without detection. However, this paper pointed out that Rizomiliotis et al.'s modification was not correct. Therefore, we designed a new authentication scheme, which inherits the advantage of Song-Mitchell protocol and Rizomiliotis et al.'s protocol, along with the assumption that the insecure channel exists between the reader and the server. Finally, this paper provides a security analysis to comparison with other protocols.
引用
收藏
页码:208 / 223
页数:16
相关论文
共 50 条
  • [41] Low-cost authentication protocol of the RFID system using partial ID
    Li, Yong-Zhen
    Jeong, Yoon-Su
    Sun, Ning
    Lee, Sang-Ho
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 598 - +
  • [42] A Low-Cost RFID Authentication Protocol Against Desynchronization with a Random Tuple
    Gao, Lijun
    Ma, Maode
    Shu, Yantai
    Lin, Feng
    Zhang, Lei
    Wei, Yuhua
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (03) : 1941 - 1958
  • [43] Pitfalls in an Ultra-lightweight Authentication Protocol for Low-cost RFID
    Chen, Chien-Ming
    Pan, Jeng-Shyang
    Tso, Raylin
    Huang, Szu-Wei
    Wu, Mu-En
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 634 - 637
  • [44] Low-cost authentication protocol of the RFID system using partial ID
    Li, Yong-Zhen
    Jeong, Yoon-Su
    Sun, Ning
    Lee, Sang-Ho
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1221 - 1224
  • [45] A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems
    Poulopoulos, George
    Markantonakis, Konstantinos
    Mayes, Keith
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 706 - 711
  • [46] SLAP: Succinct and Lightweight Authentication Protocol for low-cost RFID system
    Luo, Hanguang
    Wen, Guangjun
    Su, Jian
    Huang, Zhong
    WIRELESS NETWORKS, 2018, 24 (01) : 69 - 78
  • [47] Low-Cost RFID Authentication Protocol Based on Elliptic Curve Algorithm
    Baashirah, Rania
    Abuzneid, Abdelshakour
    Mellouki, Salah Addine
    Siraj, Zeba
    Zhan, Cheng
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2021, 13 (02) : 1 - 11
  • [48] SLAP: Succinct and Lightweight Authentication Protocol for low-cost RFID system
    Hanguang Luo
    Guangjun Wen
    Jian Su
    Zhong Huang
    Wireless Networks, 2018, 24 : 69 - 78
  • [49] Double verification protocol via secret sharing for low-cost RFID tags
    Liu, Y.
    Ezerman, M. F.
    Wang, H.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 90 (118-128): : 118 - 128
  • [50] Printing of low-cost chipless RFID tags
    Shrestha, Sika
    Yerramilli, Ramprakash
    Karmakar, Nemai Chandra
    JOURNAL OF PRINT AND MEDIA TECHNOLOGY RESEARCH, 2019, 8 (01): : 29 - 42