Analysis and Design of Group RFID Tag Security Authentication Protocol

被引:4
|
作者
Zang, Ke [1 ]
Xu, He [1 ]
Zhu, Feng [1 ]
Li, Peng [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Peoples R China
基金
中国国家自然科学基金;
关键词
LIGHTWEIGHT;
D O I
10.1007/978-3-030-22354-0_57
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Aiming at solving the defects of security and privacy of conventional RFID authentication protocols and low authentication efficiency, this paper proposes a group tag security authentication protocol. In the group authentication protocol, it needs to prove that certain tags belong to the same group and exist at the same time. The applicability of RFID authentication protocol is introduced in low-cost tag applications, and an improved scalable lightweight RFID authentication protocol is proposed. The tags only generate pseudorandom numbers and perform join (parallel to) and exclusive-OR (XOR) operations. The response message of the tag is identified by using an existing bit arbitration query tree based on grouping mechanism algorithm. Keeping update to the encrypted information in the tag is synchronized with the server throughout the group certification process. Based on these improvements, this protocol improves the efficiency and security of RFID system.
引用
收藏
页码:637 / 645
页数:9
相关论文
共 50 条
  • [1] A RFID Mutual Authentication Security Protocol Design and Analysis
    Liang, Xiaobing
    Lv, Yingjie
    Zhao, Bing
    Liu, Ying
    Sun, Zhiqiang
    Cen, Wei
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 508 - 512
  • [2] Privacy Enhanced Authentication Protocol for RFID Tag System Security
    Yeo, Sang-Soo
    Kwak, Jin
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (09): : 1 - 6
  • [3] Design and Implementation of A RFID Security Authentication Protocol
    Zhang, Lei
    Xiao, Zicong
    [J]. 2013 2ND INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION AND MEASUREMENT, SENSOR NETWORK AND AUTOMATION (IMSNA), 2013, : 102 - 105
  • [4] Security analysis of an RFID tag search protocol
    Jannati, Hoda
    Bahrak, Behnam
    [J]. INFORMATION PROCESSING LETTERS, 2016, 116 (10) : 618 - 622
  • [5] A Design of Authentication Protocol for Multi-key RFID Tag
    Kim, Jiyeon
    Jung, Jongjin
    Ko, Hoon
    Ki, Boyeon
    Joe, Susan
    Lee, Yongjun
    Chang, Yunseok
    Lee, Kyoonha
    [J]. ADVANCES IN WEB AND NETWORK TECHNOLOGIES, AND INFORMATION MANAGEMENT, PROCEEDINGS, 2007, 4537 : 644 - +
  • [6] Design and Analysis for RFID Authentication Protocol
    Zhang, Zhen
    Zhou, Shijie
    Luo, Zongwei
    [J]. PROCEEDINGS OF THE ICEBE 2008: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, 2008, : 574 - +
  • [7] RFID tag-based mutual authentication protocol with improved security for TMIS
    Chander, Bhanu
    Gopalakrishnan, Kumaravelan
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 18 (3-4) : 383 - 405
  • [8] Digital Codec design for RFID tag based on cryptographic authentication protocol
    Jeon, Jin-Oh
    Ryu, Su-Bong
    Chang, Tae-Min
    Choi, Ho-Yong
    Kang, Min-Sup
    [J]. PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, WORKSHOP PAPERS, VOL 2, 2007, : 119 - +
  • [9] A Study on Authentication Protocol for Secure RFID Tag
    Jung, Yong-hoon
    Kim, Jung-jae
    Jun, Moon-Seog
    [J]. THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 685 - 692
  • [10] An Authentication Protocol for RFID Tag and its Simulation
    Shang-Ping, Wang
    Qiao-Mei, Ma
    Ya-Ling, Zhang
    You-Sheng, Li
    [J]. Journal of Networks, 2011, 6 (03) : 446 - 453