SRFID: A hash-based security scheme for low cost RFID systems

被引:18
|
作者
Khedr, Walid I. [1 ]
机构
[1] Zagazig Univ, Fac Comp & Informat, Dept Informat Technol, Zagazig 44519, Egypt
关键词
RFID; Auhentication; Hash function; Privacy; Security;
D O I
10.1016/j.eij.2013.02.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Radio Frequency Identification (RFID) technology is a promising technology. It uses radio waves to identify objects. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. However, this ubiquitous technology has inherited problems in security and privacy, due to the powerful tracking capability of the tags. This paper proposes a new simple, low cost, and scalable security scheme relying on one-way hash functions and synchronized secret information. The proposed scheme provides a two steps mutual authentication between the backend server and the tag which does not require a secure channel between the tag reader and the backend server to complete the authentication process. The proposed scheme meets the requirements for tag delegation and secure tag ownership transfer. The general idea is to change the ID of a tag on every read attempt in a secure and synchronized manner. This means that attempts like eavesdropping, replay attacks, tag cloning, tag tracing, denial of service attack, or man-in-the-middle attacks cannot compromise the scheme. Our analysis results show that the proposed scheme outperforms existing schemes in terms of security and performance. (C) 2013 Faculty of Computers and Information, Cairo University. Production and hosting by Elsevier B.V. All rights reserved.
引用
收藏
页码:89 / 98
页数:10
相关论文
共 50 条
  • [41] An Efficient Hash-Based Load Balancing Scheme to Support Parallel NIDS
    Kim, Nam-Uk
    Jung, Sung-Min
    Chung, Tai-Myoung
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2011, PT I, 2011, 6782 : 537 - 549
  • [42] A Security RFID Authentication Protocol Based on Hash Function
    Yu Tian-tian
    Feng Quan-yuan
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 804 - 807
  • [43] A Novel Hash-Based RFID Grouping Authentication Protocol on Tag Groups and Multiple Readers
    Shen, Jian
    Tan, Haowen
    Ren, Yongjun
    Zheng, Yuhui
    Wang, Jin
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 2162 - 2171
  • [44] An Effective Hash-Based Assessment and Recovery Algorithm for Healthcare Systems
    Haraty, Ramzi A.
    Boukhari, Bahia
    Kaddoura, Sanaa
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2022, 47 (02) : 1523 - 1536
  • [45] HASH-BASED FILE CONTENT IDENTIFICATION USING DISTRIBUTED SYSTEMS
    Yannikos, York
    Schluessler, Jonathan
    Steinebach, Martin
    Winter, Christian
    Graffi, Kalman
    ADVANCES IN DIGITAL FORENSICS IX, 2013, 410 : 119 - 134
  • [46] An Efficient Hash-based RFID Grouping Authentication Protocol Providing Missing Tags Detection
    Tan, Haowen
    Choi, Dongmin
    Kim, Pankoo
    Pan, Sungbum
    Chung, Ilyong
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (02): : 481 - 488
  • [47] An Effective Hash-Based Assessment and Recovery Algorithm for Healthcare Systems
    Ramzi A. Haraty
    Bahia Boukhari
    Sanaa Kaddoura
    Arabian Journal for Science and Engineering, 2022, 47 : 1523 - 1536
  • [48] Security Threat Mitigation Trends in Low-Cost RFID Systems
    Garcia-Alfaro, Joaquin
    Barbeau, Michel
    Kranakis, Evangelos
    DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, 2010, 5939 : 193 - 207
  • [49] A Random Label and Lightweight Hash-Based Security Authentication Mechanism for a UAV Swarm
    Hu, Feng
    Qian, Hongyan
    Liu, Liangjun
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [50] A Random Label and Lightweight Hash-Based Security Authentication Mechanism for a UAV Swarm
    Hu, Feng
    Qian, Hongyan
    Liu, Liangjun
    Wireless Communications and Mobile Computing, 2021, 2021