Defense against Impersonating Attackers: An Efficient RFID Mutual Authentication Protocol Based on Standard

被引:0
|
作者
Wang, Shiqi [1 ]
Li, Linsen [1 ]
Chen, Gaosheng [1 ]
Chen, Tao [1 ]
Wang, Zeming [2 ]
机构
[1] Shanghai Jiao Tong Univ, SEIEE, 800 Dongchuan Rd, Shanghai, Peoples R China
[2] Shanghai Jiao Tong Univ, UMJI, 800 Dongchuan Rd, Shanghai, Peoples R China
关键词
RFID security; authentication; vulnerabilities;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As the RFID based Internet of Things (IoT) gets worldwide attention, to prepare for the rapidly increasing applications in daily life, various security protocols are proposed. But, these protocols, most of which are limited by the tag processing capacity and dangerous exposure during transmission, could only be applied in certain fields. Previously, Chen and Deng's mutual authentication and privacy protection protocol which conforming EPC Class 1 Generation 2 Standards stands out for low cost as well as little requirements of the tag processing capacity. However, currently reported by others, this system faces up with severe dangers of tracking or cloning tags via impersonating attacks. After scrutiny, we found out that these vulnerabilities lie in the insufficient protections of random numbers, and we reconstruct the request and response based on the original protocol by making message unrepeatable, key elements secret and adding small storage for comparisons. The security of our protocol, proved by Ban logic analysis, is ensured by double protections-secret key pairs and dynamic random numbers. Our comparisons show that our protocol not only is safe under traditional attacks guaranteed by the original protocol but also overcomes impersonating attacks which represents the inherent weakness of information exposure in public.
引用
收藏
页码:234 / 240
页数:7
相关论文
共 50 条
  • [1] Efficient Implementation of RFID Mutual Authentication Protocol
    Huang, Yu-Jung
    Lin, Wei-Cheng
    Li, Hung-Lin
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2012, 59 (12) : 4784 - 4791
  • [2] AN EFFICIENT MUTUAL AUTHENTICATION PROTOCOL FOR RFID SYSTEMS
    Lin, Iuon-Chang
    Wang, Chi-Wei
    Luo, Rui-Kun
    You, Hsin-Chiang
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (06): : 3097 - 3106
  • [3] An efficient mutual authentication protocol on RFID tags
    Huang, Hui-Feng
    [J]. EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 550 - +
  • [4] An Efficient Mutual Authentication Protocol for RFID Systems
    Lin, Iuon-Chang
    Luo, Rui-Kun
    Tsao, Shih-Chang
    [J]. HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 3, PROCEEDINGS, 2009, : 41 - +
  • [5] Mutual Authentication Protocol for RFID based on ECC
    Zheng, Lijuan
    Xue, Yujuan
    Zhang, Linhao
    Zhang, Rui
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 320 - 323
  • [6] Tracking and impersonating tags in a CRC-based ultralightweight RFID authentication protocol
    Seyed Farhad Aghili
    Hamid Mala
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 816 - 824
  • [7] A Mutual Authentication Protocol for RFID
    Wei, Chia-Hui
    Hwang, Min-Shiang
    Chin, Augustin Yeh-hao
    [J]. IT PROFESSIONAL, 2011, 13 (02) : 20 - 24
  • [8] Tracking and impersonating tags in a CRC-based ultralightweight RFID authentication protocol
    Aghili, Seyed Farhad
    Mala, Hamid
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (03) : 816 - 824
  • [9] EMAP: An Efficient Mutual Authentication Protocol for Passive RFID Tags
    GuoRui Li Ying Wang CuiRong Wang JingSha He Electronic Information Department Northeastern University at Qinhuangdao Qinhuangdao PRC Department of Information Engineering Qinhuangdao Institute of Technology Qinhuangdao PRC School of Software Engineering Beijing University of Technology Beijing PRC
    [J]. International Journal of Automation & Computing., 2012, 9 (01) - 112
  • [10] EMAP: An Efficient Mutual Authentication Protocol for Passive RFID Tags
    Guo-Rui Li1 Ying Wang2 Cui-Rong Wang1 Jing-Sha He3 1Electronic Information Department
    [J]. International Journal of Automation and Computing, 2012, (01) : 108 - 112