Design and Analysis of a Low Cost Multiple-Secret-Key RFID Security Protocol

被引:0
作者
Gao, Lijun [1 ,3 ]
Ma, Maode [2 ]
Shu, Yantai [3 ]
Liu, Chunfeng [3 ]
机构
[1] Shenyang Aerosp Univ, Dept Comp Sci & Technol, Shenyang, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore, Singapore
[3] Tianjin Univ, Sch Comp Sci & Technol, Tianjin, Peoples R China
来源
2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4 | 2012年
关键词
RFID; Security; XOR operation on large integers; multiple solution equations;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Radio Frequency Identification (RFID) will become one of the most widely used devices in the near future. However, the major barrier that the RFID systems are facing presently is the issue of security. In this paper, we propose a low-cost multiple-secret-key RFID authentication protocol based on the XOR operation on large integers and multiple solution equations. The proposed protocol can achieve major security requirements in the deployment of the RFID systems with ability to prevent eavesdropping attacks, spoofing attacks, cloning attacks, and encryption algorithm explaining attacks.
引用
收藏
页码:914 / 917
页数:4
相关论文
共 50 条
[41]   A Validated Lightweight Authentication Protocol Towards Commercial Low-Cost RFID Tags [J].
Mpalane, Kealeboga ;
Singano, Zothile ;
Lefophane, Samuel .
PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, :260-267
[42]   HEADA: a low cost RFID authentication technique using homomorphic encryption for key generation [J].
Dawoud, Mohanad ;
Altilar, D. Turgay .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) :4182-4191
[43]   Cloud database service oriented RFID security authentication protocol design [J].
Li D. .
International Journal of Simulation: Systems, Science and Technology, 2016, 17 (05) :9.1-9.5
[44]   Security and privacy analysis of RFID authentication protocol for ubiquitous computing [J].
Kim, Hyun-Seok ;
Choi, Jin-Young .
PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, :1359-+
[45]   Security and Privacy Analysis of Song–Mitchell RFID Authentication Protocol [J].
Mohammad Hassan Habibi ;
Mohammad Reza Aref .
Wireless Personal Communications, 2013, 69 :1583-1596
[46]   A Low Cost EEPROM Design for Passive RFID Tags [J].
Nuykin, Andrey ;
Kravtsov, Alexander ;
Timoshin, Sergey ;
Zubov, Igor .
2012 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS (ICCE), 2012, :443-446
[47]   Design and analysis of the light-weight mutual authentication protocol for RFID [J].
Li, Huixian .
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2012, 39 (01) :172-178
[48]   On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis [J].
Bruce, Ndibanje ;
Kim, HyunHo ;
Kang, Young Jin ;
Lee, Young Sil ;
Lee, Hoon Jae .
2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, :498-505
[49]   Mutual authentication protocol for low cost passive tag in RFID system [J].
Kumar A. ;
Jain A.K. .
International Journal of Information Technology, 2021, 13 (3) :1209-1215
[50]   A secure search protocol for lightweight and low-cost RFID systems [J].
Mojtaba Eslamnezhad Namin ;
Mehdi Hosseinzadeh ;
Nasour Bagheri ;
Ahmad Khademzadeh .
Telecommunication Systems, 2018, 67 :539-552