SRFID: A hash-based security scheme for low cost RFID systems

被引:18
|
作者
Khedr, Walid I. [1 ]
机构
[1] Zagazig Univ, Fac Comp & Informat, Dept Informat Technol, Zagazig 44519, Egypt
关键词
RFID; Auhentication; Hash function; Privacy; Security;
D O I
10.1016/j.eij.2013.02.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Radio Frequency Identification (RFID) technology is a promising technology. It uses radio waves to identify objects. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. However, this ubiquitous technology has inherited problems in security and privacy, due to the powerful tracking capability of the tags. This paper proposes a new simple, low cost, and scalable security scheme relying on one-way hash functions and synchronized secret information. The proposed scheme provides a two steps mutual authentication between the backend server and the tag which does not require a secure channel between the tag reader and the backend server to complete the authentication process. The proposed scheme meets the requirements for tag delegation and secure tag ownership transfer. The general idea is to change the ID of a tag on every read attempt in a secure and synchronized manner. This means that attempts like eavesdropping, replay attacks, tag cloning, tag tracing, denial of service attack, or man-in-the-middle attacks cannot compromise the scheme. Our analysis results show that the proposed scheme outperforms existing schemes in terms of security and performance. (C) 2013 Faculty of Computers and Information, Cairo University. Production and hosting by Elsevier B.V. All rights reserved.
引用
收藏
页码:89 / 98
页数:10
相关论文
共 50 条
  • [1] Research on Hash-Based low-cost RFID Security Authentication Protocol
    Huo Lin
    Jiang Yilin
    Hu Liangqing
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1524 - 1530
  • [2] Research on hash-based RFID security authentication protocol
    Ding, Zhenhua
    Li, Jintao
    Feng, Bo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2009, 46 (04): : 583 - 592
  • [3] A hash-based pseudonymization infrastructure for RFID systems
    Henrici, Dirk
    Goetze, Joachim
    Mueller, Paul
    SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 22 - +
  • [4] A Security and Performance Evaluation of Hash-Based RFID Protocols
    Lim, Tong-Lee
    Li, Tieyan
    Li, Yingjiu
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 406 - +
  • [5] A Hash-Based RFID Security Protocol for Strong Privacy Protection
    Sun, Da-Zhi
    Zhong, Ji-Dong
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2012, 58 (04) : 1246 - 1252
  • [6] Zero Knowledge and Hash-Based Secure Access Control Scheme for Mobile RFID Systems
    Sandhya, M.
    Rangaswamy, T. R.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2014, 39 (03) : 1897 - 1906
  • [7] Zero Knowledge and Hash-Based Secure Access Control Scheme for Mobile RFID Systems
    M. Sandhya
    T. R. Rangaswamy
    Arabian Journal for Science and Engineering, 2014, 39 : 1897 - 1906
  • [8] Secure Hash-based Search Protocols for RFID Systems
    He Jialiang
    Xu Zhiqiang
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (04): : 49 - 59
  • [9] Hash-based RFID Mutual Authentication Protocol
    Liu, Yang
    Peng, Yu
    Wang, Bailing
    Qu, Yun
    Bai, Xuefengi
    Yuan, Xinling
    Yin, Zelong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 183 - 194
  • [10] Improve Healthcare Safety Using Hash-Based Authentication Protocol for RFID Systems
    Baashirah, Rania
    Abuzneid, Abdelshakour
    Tammineedi, Akhil
    Mathew, Maneesha
    Bandaru, Neelam
    Delair, Pulkit
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 800 - 805