SRFID: A hash-based security scheme for low cost RFID systems

被引:18
|
作者
Khedr, Walid I. [1 ]
机构
[1] Zagazig Univ, Fac Comp & Informat, Dept Informat Technol, Zagazig 44519, Egypt
关键词
RFID; Auhentication; Hash function; Privacy; Security;
D O I
10.1016/j.eij.2013.02.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Radio Frequency Identification (RFID) technology is a promising technology. It uses radio waves to identify objects. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. However, this ubiquitous technology has inherited problems in security and privacy, due to the powerful tracking capability of the tags. This paper proposes a new simple, low cost, and scalable security scheme relying on one-way hash functions and synchronized secret information. The proposed scheme provides a two steps mutual authentication between the backend server and the tag which does not require a secure channel between the tag reader and the backend server to complete the authentication process. The proposed scheme meets the requirements for tag delegation and secure tag ownership transfer. The general idea is to change the ID of a tag on every read attempt in a secure and synchronized manner. This means that attempts like eavesdropping, replay attacks, tag cloning, tag tracing, denial of service attack, or man-in-the-middle attacks cannot compromise the scheme. Our analysis results show that the proposed scheme outperforms existing schemes in terms of security and performance. (C) 2013 Faculty of Computers and Information, Cairo University. Production and hosting by Elsevier B.V. All rights reserved.
引用
收藏
页码:89 / 98
页数:10
相关论文
共 50 条
  • [21] Tuning the Winternitz hash-based digital signature scheme
    Perin, Lucas Pandolfo
    Zambonin, Gustavo
    Beppler Martins, Douglas Marcelino
    Custodio, Ricardo
    Martina, Jean Everson
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 542 - 547
  • [22] Hash-based counter scheme for digital rights management
    Löytynoja, M
    Seppänen, T
    2005 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), VOLS 1 AND 2, 2005, : 121 - 124
  • [23] A Server-Assisted Hash-Based Signature Scheme
    Buldas, Ahto
    Laanoja, Risto
    Truu, Ahto
    SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 3 - 17
  • [24] A Blockchain-Assisted Hash-Based Signature Scheme
    Buldas, Ahto
    Laanoja, Risto
    Truu, Ahto
    SECURE IT SYSTEMS, 2018, 11252 : 138 - 153
  • [25] A secure and robust hash-based scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    Abbas, Vali Uddin
    SIGNAL PROCESSING, 2010, 90 (05) : 1456 - 1470
  • [26] A Secure and Scalable Identification for Hash-based RFID Systems Using Updatable Pre-computation
    Nohara, Yasunobu
    Inoue, Sozo
    WISEC 10: PROCEEDINGS ON THE THIRD ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2010, : 65 - 74
  • [27] A Dynamic Approach to Hash-Based Privacy-Preserving RFID Protocols
    Lee, Chih-Yuan
    Wu, Hsin-Lung
    Chang, Jen-Chun
    Smart Innovation, Systems and Technologies, 2013, 21 : 15 - 23
  • [28] Quantum-Access Security of Hash-Based Signature Schemes
    Yuan, Quan
    Tibouchi, Mehdi
    Abe, Masayuki
    INFORMATION SECURITY AND PRIVACY, ACISP 2023, 2023, 13915 : 343 - 380
  • [29] A new hash-based authentication protocol for RFID using varying identifiers
    Li, Shu
    Yang, Xi
    Liang, Ping-yuan
    SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 2112 - 2116
  • [30] A One-way Hash based Low-cost Authentication Protocol with Forward Security in RFID System
    He Lei
    Lu Xin-mei
    Jin Song-he
    Cai Zeng-yu
    2010 2ND INTERNATIONAL ASIA CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS (CAR 2010), VOL 2, 2010, : 269 - 272