RFID security authentication protocol based on key update mechanism

被引:0
|
作者
Wei, Ruidong [1 ]
Jiang, Lei [1 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing, Peoples R China
关键词
authentication; protocol; security; privacy; replay attack;
D O I
10.2495/ISME20131802
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper first finds the flaw of RFID authentication protocol proposed in Ref. [1] and points out which cannot resist replay attack on the reader. Then, combined with the demand of RFID security and the key update mechanism, this paper proposes an improved RFID security authentication protocol. Finally, we analyze the security and performance of the protocol. The results show that the protocol can achieve the mutual authentication of the identity, prevent from illegal reader, interception, and location tracking, resist against counterfeiting attack, replay attack, denial-of-service attack, and man-in-the-middle attack, meanwhile having forward security.
引用
收藏
页码:1395 / 1401
页数:7
相关论文
共 50 条
  • [1] On the Security of an ECC Based RFID Authentication Protocol
    Babaheidarian, Parisa
    Delavar, Mahshid
    Mohajeri, Javad
    [J]. 2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 111 - 114
  • [2] A Security-provable Authentication and Key Agreement Protocol in RFID System
    He Lei
    Gan Yong
    Li Na-Na
    Cai Zeng-Yu
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2078 - 2080
  • [3] A Security RFID Authentication Protocol Based on Hash Function
    Yu Tian-tian
    Feng Quan-yuan
    [J]. IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 804 - 807
  • [4] Authentication Protocol of RFID System Based on Security Policy
    Wang, Guichao
    Wang, Yan
    Li, Yongzhen
    [J]. 2013 THIRD INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2013, : 1242 - 1246
  • [5] An Anonymous Authentication and Key Update Mechanism for IoT Devices Based on EnOcean Protocol
    Wu, Yi
    Feng, Tao
    [J]. SENSORS, 2022, 22 (17)
  • [6] An Authentication Protocol with Key Dynamic Update Mechanism based on EAP-SAKE
    Jiang Zhi-wei
    Cheng Wen-ting
    Lin Wei
    He Lei
    [J]. 2011 INTERNATIONAL CONFERENCE ON FUTURE INFORMATION ENGINEERING (ICFIE 2011), 2011, 8 : 25 - 29
  • [7] RFID mutual authentication protocol based on chaos key
    Zhang Nan
    Zhang Jianhua
    Yang Jun
    [J]. ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1519 - 1523
  • [8] Research on RFID Security Authentication Protocol Based on HASH Function
    Chen, Zhen-huan
    Pan, Xue-feng
    [J]. 2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 251 - 255
  • [9] Mutual Authentication Security RFID Protocol Based on Time Stamp
    Zhang, Changlun
    Zhang, Wenqi
    Mu, Haibing
    [J]. 2015 FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE THEORY, SYSTEMS AND APPLICATIONS (CCITSA 2015), 2015, : 166 - 170
  • [10] An Improvement RFID Security Authentication Protocol Based on Hash Function
    Sun, Haowen
    Li, Peng
    Xu, He
    Zhu, Feng
    [J]. INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 375 - 384