Authenticated RFID security mechanism based on chaotic maps

被引:27
作者
Cheng, Zi-Yao [1 ]
Liu, Yun [1 ]
Chang, Chin-Chen [2 ,3 ]
Chang, Shih-Chang [4 ]
机构
[1] Beijing Jiaotong Univ, Beijing Municipal Commiss Educ, Key Lab Commun & Informat Syst, Dept Elect & Informat Engn, Beijing 100044, Peoples R China
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[3] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[4] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
基金
中国国家自然科学基金;
关键词
RFID; security; privacy; authentication; chaotic maps; SCHEME; PROTOCOL; CRYPTANALYSIS; PRIVACY;
D O I
10.1002/sec.709
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio frequency identification (RFID) systems rely on the significant technology of remote, automatic identification with small, low-cost RF elements to complete RF communications securely among all entities. This technology must ensure that secret information or data communicated via radio transmission are not vulnerable to intentional interception, modification for tracing the individual tag holder, or the attachment of any item. With the increase in the number of applications of RFID systems, security and privacy problems have become the focus of significant concern. In this paper, we propose an authenticated RFID security mechanism based on chaotic maps that guarantees a mutually authenticated process and uses a simple and robust chaotic cryptosystem to implement a practical RFID mechanism. The security of the transmitted information and the privacy of personal information or data were our main concerns in the proposed scheme. Also, we have provided detailed information concerning authentication proof and security aspects of our new design. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:247 / 256
页数:10
相关论文
共 26 条
[1]   Security of public-key cryptosystems based on Chebyshev polynomials [J].
Bergamo, P ;
D'Arco, P ;
De Santis, A ;
Kocarev, L .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) :1382-1393
[2]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[3]  
Chae H, 2007, P INT C RFID SEC
[4]   CRYPTANALYSIS OF A PASSWORD AUTHENTICATION SCHEME USING QUADRATIC RESIDUES [J].
CHANG, CC ;
WU, TC ;
LAIH, CS .
COMPUTER COMMUNICATIONS, 1995, 18 (01) :45-47
[5]   A novel mutual authentication scheme based on quadratic residues for RFID systems [J].
Chen, Yalin ;
Chou, Jue-Sam ;
Sun, Hung-Min .
COMPUTER NETWORKS, 2008, 52 (12) :2373-2380
[6]   The design of RFID access control protocol using the strategy of indefinite-index and challenge-response [J].
Chen, Yu-Yi ;
Tsai, Meng-Lin ;
Jan, Jinn-Ke .
COMPUTER COMMUNICATIONS, 2011, 34 (03) :250-256
[7]   Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards [J].
Chien, Hung-Yu ;
Chen, Che-Hao .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) :254-259
[8]   A Lightweight Authentication Protocol for Low-Cost RFID [J].
Chien, Hung-Yu ;
Huang, Chen-Wei .
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2010, 59 (01) :95-102
[9]   Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value [J].
Cho, Jung-Sik ;
Yeo, Sang-Soo ;
Kim, Sung Kwon .
COMPUTER COMMUNICATIONS, 2011, 34 (03) :391-397
[10]   A lightweight RFID protocol to protect against traceability and cloning attacks [J].
Dimitriou, T .
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, :59-66