RFID mutual-authentication protocol with synchronous updated-keys based on Hash function

被引:4
作者
Zhang, Xiaohong [1 ]
Hu, Yingmeng [1 ]
机构
[1] School of Information Engineering, Jiangxi University of Science and Technology, Ganzhou
来源
Journal of China Universities of Posts and Telecommunications | 2015年 / 22卷 / 06期
基金
中国国家自然科学基金;
关键词
BAN logic; Hash function; mutual-authentication protocol; RFID; synchronization;
D O I
10.1016/S1005-8885(15)60690-2
中图分类号
学科分类号
摘要
With the wide application of radio frequency identification (RFID) technology, its security privacy issues are becoming more and more prominent. A RFID mutual-authentication protocol with synchronous updated-keys based on Hash function is proposed to tackle those problems in this paper. An updated mechanism of the dynamic tag keys is introduced and a self-synchronized scheme is designed in the protocol, which has achieved the second verification for the tags. The security of the protocol is verified and analyzed by the Burrows-Abadi-Needham (BAN) logic and the attack models, moreover it has been compared with the existing schemes of security properties and its storage and computational performance. The results show that the proposed protocol has the ability to considerably reduce the amount of computation between tags and back-end database, and enhance the search efficiency of the whole system without the additional cost of the tags. It can satisfy safe requirements of RFID system effectively, also improve the authentication efficiency. The proposed protocol is more suitable for the low cost RFID system. © 2015 The Journal of China Universities of Posts and Telecommunications.
引用
收藏
页码:27 / 35
页数:8
相关论文
共 25 条
[1]  
Want R., An introduction to RFID technology, IEEE Pervasive Computing, 5, 1, pp. 25-33, (2006)
[2]  
Weinstein R., RFID: A technical overview and its application to the enterprise, IT Professional, 7, 3, pp. 27-33, (2005)
[3]  
Spiekermann S., Evdokimov S., Critical RFID privacy-enhancing technologies, IEEE Security & Privacy, 7, 2, pp. 56-62, (2009)
[4]  
Paise R.I., Vaudenay S., Mutual Authentication in RFID: Security and Privacy. Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), Mar 18-20, 2008, Tokyo, Japan, pp. 292-299, (2008)
[5]  
Peris-Lopez P., Hernandez-Castro J.C., Estevez-Tapiador J.M., Et al., RFID Systems: A Survey on Security Threats and Proposed Solutions. Processing of the IFIP 11th International Conference on Personal Wireless Communications (PWC'06), Sept 20-22, 2006, Albacete, Spain. LNCS 4217, pp. 159-170, (2006)
[6]  
Phan R.C.W., Wu J., Ouafi K., Et al., Privacy analysis of forward and backward untraceable RFID authentication schemes, Wireless Personal Communications: An International Journal, 61, 1, pp. 69-81, (2011)
[7]  
Yu Y.C., Hou T.W., Chiang T.C., Low cost RFID real lightweight binding proof protocol for medication errors and patient safety, Journal of Medical Systems, 36, 2, pp. 823-828, (2012)
[8]  
Kapoor G., Zhou W., Piramuthu S., Multi-tag and multi-owner RFID ownership transfer in supply chains, Decision Support Systems, 52, 1, pp. 258-270, (2011)
[9]  
Chen T.H., Shih W.K., A robust mutual authentication protocol for wireless sensor networks, ETRI Journal, 32, 5, pp. 704-712, (2010)
[10]  
Pham T.A., Hasan M.S., Yu H.N., A RFID Mutual Authentication Protocol Based on AES Algorithm. Proceedings of the 2012 UKACC International Conference on Control. Sept 3-5, 2012, Cardiff, UK, pp. 997-1002, (2012)