SRFID: A hash-based security scheme for low cost RFID systems

被引:18
|
作者
Khedr, Walid I. [1 ]
机构
[1] Zagazig Univ, Fac Comp & Informat, Dept Informat Technol, Zagazig 44519, Egypt
关键词
RFID; Auhentication; Hash function; Privacy; Security;
D O I
10.1016/j.eij.2013.02.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Radio Frequency Identification (RFID) technology is a promising technology. It uses radio waves to identify objects. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. However, this ubiquitous technology has inherited problems in security and privacy, due to the powerful tracking capability of the tags. This paper proposes a new simple, low cost, and scalable security scheme relying on one-way hash functions and synchronized secret information. The proposed scheme provides a two steps mutual authentication between the backend server and the tag which does not require a secure channel between the tag reader and the backend server to complete the authentication process. The proposed scheme meets the requirements for tag delegation and secure tag ownership transfer. The general idea is to change the ID of a tag on every read attempt in a secure and synchronized manner. This means that attempts like eavesdropping, replay attacks, tag cloning, tag tracing, denial of service attack, or man-in-the-middle attacks cannot compromise the scheme. Our analysis results show that the proposed scheme outperforms existing schemes in terms of security and performance. (C) 2013 Faculty of Computers and Information, Cairo University. Production and hosting by Elsevier B.V. All rights reserved.
引用
收藏
页码:89 / 98
页数:10
相关论文
共 50 条
  • [31] A New Hash-Based Enhanced Privacy ID Signature Scheme
    Chen, Liqun
    Dong, Changyu
    El Kassem, Nada
    Newton, Christopher J. P.
    Wang, Yalan
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2024, PT I, 2024, 14771 : 37 - 71
  • [32] Cryptanalysis of Hash-Based Tamed Transformation and Minus Signature Scheme
    Nie, Xuyun
    Xu, Zhaohu
    Buchmann, Johannes
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2013, 2013, 7932 : 155 - 164
  • [33] A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems
    Deebak, B. D.
    Al-Turjman, Fadi
    Mostarda, Leonardo
    SENSORS, 2019, 19 (18)
  • [34] BAHS: A Blockchain-Aided Hash-Based Signature Scheme
    Wang, Yalan
    Chen, Liqun
    Meng, Long
    Tian, Yangguang
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2023, 2023, 14341 : 419 - 439
  • [35] A Hash-Based Quantum-Resistant Chameleon Signature Scheme
    Thanalakshmi, P.
    Anitha, R.
    Anbazhagan, N.
    Cho, Woong
    Joshi, Gyanendra Prasad
    Yang, Eunmok
    SENSORS, 2021, 21 (24)
  • [36] Security and privacy solutions for low-cost RFID systems
    Ranasinghe, DC
    Engels, DW
    Cole, PH
    Proceedings of the 2004 Intelligent Sensors, Sensor Networks & Information Processing Conference, 2004, : 337 - 342
  • [37] Evaluating Accelerators for a High-Throughput Hash-Based Security Protocol
    Lee, Kaitlyn
    Donnelly, Brian
    Sery, Tomer
    Ilan, Dan
    Cambou, Bertrand
    Gowanlock, Michael
    PROCEEDINGS OF THE 52ND INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS PROCEEDINGS, ICPP-W 2023, 2023, : 40 - 49
  • [38] A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme
    Thanalakshmi, P.
    Anitha, R.
    Anbazhagan, N.
    Park, Chulho
    Joshi, Gyanendra Prasad
    Seo, Changho
    MATHEMATICS, 2022, 10 (10)
  • [39] Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric Networks
    Bouk, Safdar H.
    Ahmed, Syed Hassan
    Kim, Dongkyun
    2014 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE), 2014, : 765 - 766
  • [40] A secure searchable encryption scheme for cloud using hash-based indexing
    Andola, Nitish
    Prakash, Sourabh
    Yadav, Vijay Kumar
    Raghav
    Venkatesan, S.
    Verma, Shekhar
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2022, 126 : 119 - 137