An Authentication Scheme for Ubiquitous RFID Systems

被引:0
|
作者
Yeh, Kuo-Hui [1 ]
Chen, YuShan [1 ]
Wang, Fan-Wei [1 ]
机构
[1] Natl Dong Hwa Univ, Dept Informat Management, Hualien, Taiwan
关键词
Authentication; privacy; RFID; security; SUAP3; PROTOCOL; SECURITY;
D O I
10.3233/978-1-61499-462-6-41
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to fulfill system security and computation limitation of low-cost RF tags at the same time, the research of the lightweight RFID authentication has promptly become one of the hottest topics in recent years. Recently, Morshed et al. proposed an authentication scheme, called SUAP3, to achieve the security and efficiency under ubiquitous RFID-based systems. Later, Safkhani et al. and Wang et al. had demonstrated that SUAP3 is insecure against full-disclosure attack and tag traceability attack. However, these attacks are based on powerful assumptions, and the feasibilities of the two attacks are thus a little doubtful. In this paper, we present a real passive tag-tracking attack without any specific assumptions. An adversary can exploit a series of challenge-response procedures to derive the secrets maintained at the tag. With the cryptanalysis proposed by us, the insecurity of SUAP3 is truly proved. In addition, we present a novel and robust ubiquitous authentication scheme for RFID based application systems.
引用
下载
收藏
页码:41 / 50
页数:10
相关论文
共 50 条
  • [31] An Improved Authentication Scheme for Applying RFID in VANETs
    Zhang, Qingwei
    Almulla, Mohammed
    Boukerche, Azzedine
    2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [32] A Lightweight Authentication Scheme for RFID Using ECC
    Kumar, Atul
    Jain, Ankit Kumar
    4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2020, 1122 : 177 - 183
  • [33] A secure RFID authentication scheme for medicine applications
    Wu, Zhen-Yu
    Chen, Tzer-Long
    Lin, Sung-Chiang
    Wang, Charlotte
    2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 175 - 181
  • [34] An enhanced authentication scheme in mobile RFID system
    Chiou, Shin-Yan
    Chang, Shan Yen
    AD HOC NETWORKS, 2018, 71 : 1 - 13
  • [35] A privacy preserving authentication scheme for roaming in ubiquitous networks
    Shehzad Ashraf Chaudhry
    Aiiad Albeshri
    Naixue Xiong
    Changhoon Lee
    Taeshik Shon
    Cluster Computing, 2017, 20 : 1223 - 1236
  • [36] User authentication scheme preserving anonymity for ubiquitous devices
    Djellali, Benchaa
    Belarbi, Kheira
    Chouarfia, Abdallah
    Lorenz, Pascal
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3131 - 3141
  • [37] A privacy preserving authentication scheme for roaming in ubiquitous networks
    Chaudhry, Shehzad Ashraf
    Albeshri, Aiiad
    Xiong, Naixue
    Lee, Changhoon
    Shon, Taeshik
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (02): : 1223 - 1236
  • [38] Security Enhancement for a Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems
    Hsiang, Han-Cheng
    Kuo, Hsiang-Chou
    Shih, Wei-Kuan
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 693 - +
  • [39] An Enhanced Authentication Protocol for RFID Systems
    Hosseinzadeh, Mehdi
    Ahmed, Omed Hassan
    Ahmed, Sarkar Hasan
    Trinh, Cuong
    Bagheri, Nasour
    Kumari, Saru
    Lansky, Jan
    Huynh, Bao
    IEEE ACCESS, 2020, 8 (08): : 126977 - 126987
  • [40] An Authentication Protocol for Ubiquitous Health Monitoring Systems
    Yeh, Chang-Kuo
    Chen, Hung-Ming
    Lo, Jung-Wen
    JOURNAL OF MEDICAL AND BIOLOGICAL ENGINEERING, 2013, 33 (04) : 415 - 419