An Efficient and Secure Authentication Protocol for RFID Systems

被引:0
|
作者
Morshed, Md. Monzur [1 ]
Atkins, Anthony [1 ]
Yu, Hong-Nian [1 ]
机构
[1] Staffordshire Univ, Fac Comp Engn & Technol, Stoke On Trent ST18 0DF, Staffs, England
关键词
Radio frequency identification (RFID); security; privacy; timestamp; authentication protocol;
D O I
10.1007/s11633-012-0642-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The use of radio frequency identification (RFID) tags may cause privacy violation of users carrying an RFID tag. Due to the unique identification number of the RFID tag, the possible privacy threats are information leakage of a tag, traceability of the consumer, denial of service attack, replay attack and impersonation of a tag, etc. There are a number of challenges in providing privacy and security in the RFID tag due to the limited computation, storage and communication ability of low- cost RFID tags. Many research works have already been conducted using hash functions and pseudorandom numbers. As the same random number can recur many times, the adversary can use the response derived from the same random number for replay attack and it can cause a break in location privacy. This paper proposes an RFID authentication protocol using a static identifier, a monotonically increasing timestamp, a tag side random number and a hash function to protect the RFID system from adversary attacks. The proposed protocol also indicates that it requires less storage and computation than previous existing RFID authentication protocols but offers a larger range of security protection. A simulation is also conducted to verify some of the privacy and security properties of the proposed protocol.
引用
收藏
页码:257 / 265
页数:9
相关论文
共 50 条
  • [21] A novel secure group RFID authentication protocol
    GUO Cong
    ZHANG Zi-jian
    ZHU Lie-huang
    TAN Yu-an
    YANG Zhen
    [J]. The Journal of China Universities of Posts and Telecommunications, 2014, (01) : 94 - 103
  • [22] A Study on Authentication Protocol for Secure RFID Tag
    Jung, Yong-hoon
    Kim, Jung-jae
    Jun, Moon-Seog
    [J]. THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 685 - 692
  • [23] RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing
    Kumar, Vinod
    Ahmad, Musheer
    Mishra, Dheerendra
    Kumari, Saru
    Khan, Muhammad Khurram
    [J]. VEHICULAR COMMUNICATIONS, 2020, 22
  • [24] An Efficient and Secure RFID Batch Authentication Protocol with Group Tags Ownership Transfer
    Zhang, Rong
    Zhu, Liehuang
    Xu, Chang
    Yi, Yi
    [J]. 2015 IEEE CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2015, : 168 - 175
  • [25] A novel secure group RFID authentication protocol
    GUO Cong
    ZHANG Zi-jian
    ZHU Lie-huang
    TAN Yu-an
    YANG Zhen
    [J]. The Journal of China Universities of Posts and Telecommunications, 2014, 21 (01) - 103
  • [26] Secure and efficient lightweight RFID authentication protocol based on fast tag indexing
    Pang, Liaojun
    Li, Huixian
    He, Liwei
    Alramadhan, Ali
    Wang, Yumin
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (11) : 3244 - 3254
  • [27] An efficient authentication protocol for RFID systems resistant to active attacks
    Peris-Lopez, Pedro
    Cesar Hernandez-Castro, Julio
    Estevez-Tapiador, Juan M.
    Ribagorda, Arturo
    [J]. EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 781 - 794
  • [28] An efficient authentication protocol for low-cost RFID systems
    Jin, Zhen-Ai
    Cho, Hyun-Ju
    Yoo, Kee-Young
    [J]. AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2007, 4496 : 999 - +
  • [29] A secure authentication scheme for RFID systems
    Dass, Prajnamaya
    Om, Hari
    [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 100 - 106
  • [30] An Efficient and Secure Protocol for Low-cost RFID Systems
    Zhao, Feng
    Li, Huiyun
    Yu, Fengqi
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 51 - 54