An efficient RFID authentication protocol supporting tag ownership transfer

被引:0
作者
Jialiang, He [1 ,2 ]
Dantong, Ouyang [1 ,2 ]
Youjun, Xu [3 ]
Yu, Shang [1 ,2 ]
机构
[1] College of Computer Science and Technology, Jilin University
[2] Key Laboratory of Symbolic Computation, Knowledge Engineering of Ministry of Education, Jilin University
[3] College of Computer Science and Information Technology, Daqing Normal University
关键词
Authentication protocol; RFID; Tag ownership transfer;
D O I
10.4156/ijact.vol4.issue4.30
中图分类号
学科分类号
摘要
Except common security and privacy requirements, well scalability and supporting tag ownership transfer are important requests for RFID systems. In this paper, an efficient RFID mutual authentication protocol supporting tag ownership transfer is proposed, this protocol only requires O(1) work to identify and authenticate a tag in the backend server and is suitable for the low-cost RFID systems. The security and performance of the proposed protocol are analyzed as well.
引用
收藏
页码:244 / 253
页数:9
相关论文
共 13 条
[1]  
Wang L., Yi X., Lv C., Guo Y., Security Improvement in Authentication Protocol for Gen-2 Based RFID System, Journal of Convergence Information Technology, AICIT, 6, 1, pp. 157-169, (2011)
[2]  
Juels A., RFID Security and Privacy: A Research Survey, Journal of Selected Areas in Communications, Institute of Electrical and Electronics Engineers, 24, pp. 381-394, (2006)
[3]  
Bondi A.B., Characteristics of Scalability and Their Impact on Performance, Proceedings of the Second International Workshop on Software and Performance-WOSP 2000, pp. 195-203, (2000)
[4]  
Song B., Mitchell C.J., Scalable RFID Security Protocols Supporting Tag Ownership Transfer, Computer Communications, Elsevier, 34, pp. 556-566, (2010)
[5]  
Jialiang H., Dantong O., Yuxin Y., An Efficient Lightweight RFID Authentication Protocol for Low-cost Tags, Advances in Information Sciences and Service Sciences, AICIT, 3, 9, pp. 331-338, (2011)
[6]  
Dimitriou T., A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks, Proceedings of Conference on Security and Privacy for Emerging Areas in Communication Networks-SecureComm 2005, pp. 59-66, (2005)
[7]  
Tsudik G., YA-TRAP: Yet Another Trivial RFID Authentication Protocol, Proceedings of Fourth IEEE Annual Conference on Pervasive Computing and Communications, pp. 640-643, (2006)
[8]  
Song B., Mitchell C.J., RFID Authentication Protocol for Low-cost Tags, Proceedings of First ACM Conference on Wireless Network Security, pp. 140-147, (2008)
[9]  
Cho J.-S., Yeo S.-S., Kima S.K., Securing against Brute-force Attack: A Hashbased RFID Mutual Authentication Protocol Using a Secret Value, Journal of Computer Communications, 34, pp. 391-397, (2010)
[10]  
Wei C.-H., Hwang M.-S., Chin A.Y.-H., A Mutual Authentication Protocol for RFID, Journal of IT Professional, 3, pp. 20-24, (2011)