An enhanced authentication scheme in mobile RFID system

被引:16
作者
Chiou, Shin-Yan [1 ,2 ,3 ]
Chang, Shan Yen [1 ]
机构
[1] Chang Gung Univ, Coll Engn, Dept Elect Engn, 259 Wen Hwa 1st Rd, Taoyuan, Taiwan
[2] Linkou Chang Gung Mem Hosp, Dept Nucl Med, Taoyuan, Taiwan
[3] Chang Gung Univ, Ctr Biomed Engn, Taoyuan, Taiwan
关键词
Mobile RFID; Authentication; Privacy; QUADRATIC RESIDUES; PROTOCOL; PRIVACY;
D O I
10.1016/j.adhoc.2017.12.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The popularization of wireless networks and mobile applications has increased the importance of RFID technologies. However, since wireless networks does not guarantee transmission channel security, putting private user information at risk for unintentional disclosure. Previous research has introduced a security mechanism to provide privacy and authentication. This mechanism is based on quadratic residue, does not require a secure channel and fits EPC Class-1 Gen-2 specifications. However, this mechanism cannot resist replay attacks, and lacks an efficient means of its server is not able to find determining validating values, making it difficult to implement. This paper proposes an improvement scheme that uses virtual IDs and time parameters. It does not need a secure channel, fits EPC Class-1 Gen-2 specifications, is resistant to replay attacks, and can efficiently find validation information. The proposed scheme is applied to mobile devices as a proof of concept for use in wireless/mobile RFID systems. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:1 / 13
页数:13
相关论文
共 25 条
  • [1] Providing destructive privacy and scalability in RFID systems using PUFs
    Akgun, Mete
    Caglayan, M. Ufuk
    [J]. AD HOC NETWORKS, 2015, 32 : 32 - 42
  • [2] [Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
  • [3] [Anonymous], 2015, AD HOC NETW, DOI DOI 10.1016/j.adhoc.2014.12.006
  • [4] A SIMPLE UNPREDICTABLE PSEUDORANDOM NUMBER GENERATOR
    BLUM, L
    BLUM, M
    SHUB, M
    [J]. SIAM JOURNAL ON COMPUTING, 1986, 15 (02) : 364 - 383
  • [5] A Novel Mutual Authentication Scheme for RFID Conforming EPCglobal Class 1 Generation 2 Standards
    Chen, Chin-Ling
    Huang, Yu-Cheng
    Shih, Tzay-Farn
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (03): : 220 - 228
  • [6] Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection
    Chen, Chin-Ling
    Deng, Yong-Yuan
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2009, 22 (08) : 1284 - 1291
  • [7] A novel mutual authentication scheme based on quadratic residues for RFID systems
    Chen, Yalin
    Chou, Jue-Sam
    Sun, Hung-Min
    [J]. COMPUTER NETWORKS, 2008, 52 (12) : 2373 - 2380
  • [8] Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment
    Chiou, Shin-Yan
    Ying, Zhaoqin
    Liu, Junqiang
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (04) : 1 - 15
  • [9] Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
    Cho, Jung-Sik
    Yeo, Sang-Soo
    Kim, Sung Kwon
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 391 - 397
  • [10] Darianian M., 2008, ICACTE 08 INT C IEEE