An Authentication Scheme for Ubiquitous RFID Systems

被引:0
|
作者
Yeh, Kuo-Hui [1 ]
Chen, YuShan [1 ]
Wang, Fan-Wei [1 ]
机构
[1] Natl Dong Hwa Univ, Dept Informat Management, Hualien, Taiwan
关键词
Authentication; privacy; RFID; security; SUAP3; PROTOCOL; SECURITY;
D O I
10.3233/978-1-61499-462-6-41
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to fulfill system security and computation limitation of low-cost RF tags at the same time, the research of the lightweight RFID authentication has promptly become one of the hottest topics in recent years. Recently, Morshed et al. proposed an authentication scheme, called SUAP3, to achieve the security and efficiency under ubiquitous RFID-based systems. Later, Safkhani et al. and Wang et al. had demonstrated that SUAP3 is insecure against full-disclosure attack and tag traceability attack. However, these attacks are based on powerful assumptions, and the feasibilities of the two attacks are thus a little doubtful. In this paper, we present a real passive tag-tracking attack without any specific assumptions. An adversary can exploit a series of challenge-response procedures to derive the secrets maintained at the tag. With the cryptanalysis proposed by us, the insecurity of SUAP3 is truly proved. In addition, we present a novel and robust ubiquitous authentication scheme for RFID based application systems.
引用
下载
收藏
页码:41 / 50
页数:10
相关论文
共 50 条
  • [21] A study on improved RFID authentication scheme
    Seo, Dae-Hee
    Baek, Jang-Mi
    Li, Jiang
    Kang, Soo-Young
    Lee, Im-Yeong
    Oh, Hyung-Geun
    MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 567 - +
  • [22] The RFID Mutual Authentication scheme Based on FCC and OTP Authentication
    Chen, Chunling
    Wang, Yang
    Yu, Han
    Qiang, Xiao-Hui
    2016 IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS WIRELESS BROADBAND (ICUWB2016), 2016,
  • [23] Security and privacy analysis of RFID authentication protocol for ubiquitous computing
    Kim, Hyun-Seok
    Choi, Jin-Young
    PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 1359 - +
  • [24] A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems
    Doss, Robin
    Sundaresan, Saravanan
    Zhou, Wanlei
    AD HOC NETWORKS, 2013, 11 (01) : 383 - 396
  • [25] An Elliptic Curve-based Mutual Authentication Scheme for RFID Implant Systems
    Moosavi, Sanaz Rahimi
    Nigussie, Ethiopia
    Virtanen, Seppo
    Isoaho, Jouni
    5TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2014), THE 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2014), 2014, 32 : 198 - 206
  • [26] Improvement of a Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems
    Horng, Wen-Bing
    Lee, Cheng-Ping
    Peng, Jian-Wen
    JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING, 2009, : 373 - +
  • [27] An Efficient Ultra lightweight Mutual Authentication Scheme for RFID Systems: Airy Protocol
    Yeh, Kuo-Hui
    Lo, N. W.
    Winata, Enrico
    JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (06): : 887 - 897
  • [28] Anonymous Authentication for RFID Systems
    Armknecht, Frederik
    Chen, Liqun
    Sadeghi, Ahmad-Reza
    Wachsmann, Christian
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 158 - +
  • [29] An improved anonymous authentication scheme for roaming in ubiquitous networks
    Lee, Hakjun
    Lee, Donghoon
    Moon, Jongho
    Jung, Jaewook
    Kong, Dongwoo
    Kim, Hyoungshick
    Won, Dongho
    PLOS ONE, 2018, 13 (03):
  • [30] A Lightweight Authentication Protocol Scheme for RFID Security
    WEI Guoheng
    ZHANG Huanguo
    Wuhan University Journal of Natural Sciences, 2013, 18 (06) : 504 - 510