An Authentication Scheme for Ubiquitous RFID Systems

被引:0
|
作者
Yeh, Kuo-Hui [1 ]
Chen, YuShan [1 ]
Wang, Fan-Wei [1 ]
机构
[1] Natl Dong Hwa Univ, Dept Informat Management, Hualien, Taiwan
关键词
Authentication; privacy; RFID; security; SUAP3; PROTOCOL; SECURITY;
D O I
10.3233/978-1-61499-462-6-41
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to fulfill system security and computation limitation of low-cost RF tags at the same time, the research of the lightweight RFID authentication has promptly become one of the hottest topics in recent years. Recently, Morshed et al. proposed an authentication scheme, called SUAP3, to achieve the security and efficiency under ubiquitous RFID-based systems. Later, Safkhani et al. and Wang et al. had demonstrated that SUAP3 is insecure against full-disclosure attack and tag traceability attack. However, these attacks are based on powerful assumptions, and the feasibilities of the two attacks are thus a little doubtful. In this paper, we present a real passive tag-tracking attack without any specific assumptions. An adversary can exploit a series of challenge-response procedures to derive the secrets maintained at the tag. With the cryptanalysis proposed by us, the insecurity of SUAP3 is truly proved. In addition, we present a novel and robust ubiquitous authentication scheme for RFID based application systems.
引用
收藏
页码:41 / 50
页数:10
相关论文
共 50 条
  • [41] Mutual Authentication Protocols for RFID Systems
    Omer, Ashrar A.
    Thomas, Johnson P.
    Zhu, Ling
    INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING, 2008, 5 (04) : 348 - 365
  • [42] Mutual Authentication Protocols for RFID Systems
    Ashrar A.Omer
    Johnson P.Thomas
    Machine Intelligence Research, 2008, (04) : 348 - 365
  • [43] Secure Authentication Protocol for RFID Systems
    Khan, Gul N.
    Moessner, Markus B.
    2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
  • [44] A Privacy-Preserving Roaming Authentication Scheme for Ubiquitous Networks
    Zhou, You-sheng
    Zhou, Jun-feng
    Wang, Feng
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 463 - 471
  • [45] Cryptanalysis and improvement of authentication scheme for roaming service in ubiquitous network
    Khatoon, Shaheena
    Singh Thakur, Balwant
    CRYPTOLOGIA, 2020, 44 (04) : 315 - 340
  • [46] Lightweight, ECC based RFID Authentication Scheme for WLAN
    Kumar, Amit
    Om, Hari
    INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2016, 12 (02) : 89 - 103
  • [47] Improvement of the RFID authentication scheme based on quadratic residues
    Yeh, Tzu-Chang
    Wu, Chien-Hung
    Tseng, Yuh-Min
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 337 - 341
  • [48] Vulnerabilities of an ECC-based RFID authentication scheme
    Li, Nan
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Varadharajan, Vijay
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3262 - 3270
  • [49] A Reliable RFID Mutual Authentication Scheme for Healthcare Environments
    Zhen-Yu Wu
    Lichin Chen
    Ju-Chuan Wu
    Journal of Medical Systems, 2013, 37
  • [50] A Location-privacy-protected RFID Authentication Scheme
    Chang, Ya-Fen
    Lin, Shao-Cian
    Chang, Pei-Yu
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,