A Hash Function-Based RFID Authentication Protocol


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


The Radio Frequency Identification (RFID) is an automatic identification system, which is widely used for industrial and individual applications. Evolvement and benefits of RFID technology signifies that it can be low-cost, efficient and secured solution to many pervasive applications.
However, features of RFID systems present potential security and privacy problems. The ensuring strong privacy has been an enormous challenge due to extremely inadequate computational storage of typical RFID tags. In an effort to resolve these problems and protect the users from tracing and to support Low-cost RFID, in this paper, we propose an RFID security method that achieves all requirements based on a hash function and a symmetric key cryptosystem. In addition, our proposed method provides not only high-security but also high-efficiency.


Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


RFID; Authentication; Indistinguishability; Privacy; Security

Full Text:

PDF


References


Jun-Jiat Tiang, Tien-Sze Lim, Fabian Kung, Near Field UHF RFID Tag Antenna Backed by a Conducting Loop Reflector, International Review on Computers and Software (IRECOS), v 3, n 5, p 1093-1096, October 2010.

Mirzaee Hossein, Pourzaki Abbas, On-Chip Passive Devices Technology: Component's Characteristics, Fabrication and Commercialization, International Review on Computers and Software (IRECOS), v 6, n 3, p 434-447, May 2011.

Jun-Jiat Tiang, Tien-Sze Lim, Fabian Kung, An improvement anti-collision scheme for RFID reader based on pluse algorithm, International Review on Computers and Software (IRECOS), v 7, n 1, p 382-386, 2012.

Zhong, Xiaoqiang,Blind channel estimation of relaying cooperative communication in IoT systems, International Review on Computers and Software (IRECOS), v 7, n 1, p 450-455, 2012.

A. Juels, “RFID Security and Privacy: A Research Survey,”manuscript, RSA Laboratories, Sept. 2005.

S. Weis et al., “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems,” Proc. First Int’l Conf. Security in Pervasive Computing (SPC ’03), Mar. 2003.

H. Lee and J. Kim, “Privacy Threats and Issues in Mobile RFID,” Proc. First Int’l Conf. Availability, Reliability and Security (ARES ’06), Apr. 2006.

D. Molnar and D. Wagner, “Privacy and Security in Library RFID: Issues, Practices, and Architectures,” Proc. 11th ACM Conf. Computer and Comm. Security (CCS ’04), Oct. 2004.

S. Sarma, S. Weis, and D. Engels, “RFID Systems and Security and Privacy Implications,” Proc. Fourth Int’l Workshop Cryptographic Hardware and Embedded Systems (CHES ’02), Aug. 2002.

Chen, C.-L., and Deng, Y.-Y. Conformation of EPC Class 1 Generation 2 Standards RFID system with Mutual Authentication and Privacy Protection. Engineering Applications of Artificial Intelligence, Elsevier, 2008.

Qingling, C., Yiju, Z., and Yonghua, W. A minimalist mutual authentication protocol for rfid system and ban logic analysis. Computing, Communication, Control and Management, ISECS International Colloquium Feb 2008.

Sun, H.-M., and Ting, W.-C. A Gen2-based RFID authentication protocol for security and privacy. IEEE Transactions on Mobile Computing 99, Jan 2009.

Mike Burmester, Breno de Medeiros, Jorge Munilla, Alberto Peinado, Secure EPC Gen2 Compliant Radio Frequency Identification, In Pedro M. Ruiz(Ed.), Ad-Hoc, Mobile and Wireless Networks, p 227-240, 2009.

Lee, S.M., Hwang, Y.J., Lee, D.H., Lim, J.I.: Efficient Authentication for Low-Cost RFID Systems. In: Gervasi, O., Gavrilova, M., Kumar, V., Laganà, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3483, Springer, Heidelberg , 2005

Kinoshita, S., Hoshino, F., Komuro, T., Fujimura, A., Ohkubo, M.: Low-cost RFID Privacy Protection Scheme. IPSJ Journal 45(8), p 2007–2021, 2004

Lee, S., Asano, T., Kim, K.: RFID: Mutual Authentication Scheme based on Synchronized Secret Information. In: Proceedings of the SCIS , 2006.

Lee, Y.K., Verbauwhede, I.: Secure and Low-cost RFID Authentication Protocols. In: AWiN. 2nd IEEE International Workshop on Adaptive Wireless Networks(November 2005)

D.N. Duc et al., “Enhancing Security of EPCglobal Gen2 RFID Tag against Traceability and Cloning,” Proc. Third Conf. Soft Computing and Intelligent Systems (SCIS ’06), Jan. 2006.

M. Ohkubo, K. Suzuki, S. Kinoshita, “Cryptographic Approach to ‘Privacy-Friendly’ Tags,” Proc. Radio Frequency Identification (RFID) Privacy Workshop, Nov. 2003.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize