A Lightweight RFID Authentication Protocol using Step by step Symmetric Key Change

被引:0
|
作者
Kim, Kyoungyoul [1 ]
Chung, Kyungho [1 ]
Shin, Juseok [1 ]
Kang, Hyunwoo [1 ]
Oh, Sejin [1 ]
Han, Chunho [1 ]
Ahn, Kwangseon [1 ]
机构
[1] Kyungpook Natl Univ, Sch Elect Engn & Comp Sci, Taegu, South Korea
关键词
RFID; AES; Authentication; Symmetric Key;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The RFID system has the risk of location tracking and user privacy. Even the cryptograph access method using hash function and re-encryption is difficult to it applies because there is a limit of computing and storage capacity of Tag. In this paper, the AES is used for the lightweight authentication, and the step by step procedure could change the key value three times. This could prevent the key exposure. The symmetric keys of the tag and server are successively changed by the random number generated by tag, reader and server. As a result, the output of the tag and reader always changes. These key changes could make it possible to prevent eavesdropping, replay attack, location tracking.
引用
收藏
页码:853 / 854
页数:2
相关论文
共 50 条
  • [31] An Improved Lightweight RFID Authentication Protocol for Internet of Things
    Yang, Xu
    Yi, Xun
    Zeng, Yali
    Khalil, Ibrahim
    Huang, Xinyi
    Nepal, Surya
    WEB INFORMATION SYSTEMS ENGINEERING, WISE 2018, PT I, 2018, 11233 : 111 - 126
  • [32] SKINNY-Based RFID Lightweight Authentication Protocol
    Xiao, Liang
    Xu, He
    Zhu, Feng
    Wang, Ruchuan
    Li, Peng
    SENSORS, 2020, 20 (05)
  • [33] A lightweight anti-desynchronization RFID authentication protocol
    Shijie Zhou
    Zhen Zhang
    Zongwei Luo
    Edward C. Wong
    Information Systems Frontiers, 2010, 12 : 521 - 528
  • [34] A lightweight anti-desynchronization RFID authentication protocol
    Zhou, Shijie
    Zhang, Zhen
    Luo, Zongwei
    Wong, Edward C.
    INFORMATION SYSTEMS FRONTIERS, 2010, 12 (05) : 521 - 528
  • [35] Secure and Lightweight Authentication Protocol for Mobile RFID Privacy
    Lee, Hyeong-Chan
    Eom, TaeYang
    Yi, Jeong Hyun
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (01): : 421 - 426
  • [36] A dynamic key authentication protocol for RFID system
    Mu H.
    Zheng Z.
    Mu, Haibing (hbmu@bjtu.edu.cn), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (07): : 210 - 215
  • [37] Authentication protocol based on key array for RFID
    Ding, Zhi-Guo
    Guo, Li
    Wang, Yu-Jie
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (03): : 722 - 726
  • [38] A Lightweight Key Agreement Protocol with Authentication Capability
    Guan, Albert
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2021, 32 (04) : 389 - 404
  • [39] Lightweight RFID dual-tag authentication protocol using cloud and PUF
    Ai L.
    Chang Z.
    Fan W.
    Kong D.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (01): : 177 - 191
  • [40] Secured Routing in VANETs Using Lightweight Authentication and Key Agreement Protocol
    Sandou, D. Kiruba
    Jothy, N.
    Jayanthi, K.
    2018 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2018,