A novel mutual authentication scheme based on quadratic residues for RFID systems

被引:110
作者
Chen, Yalin [2 ]
Chou, Jue-Sam [1 ]
Sun, Hung-Min [2 ]
机构
[1] Nanhua Univ, Dept Informat Management, Chiayi 622, Taiwan
[2] Natl Tsing Hua Univ, Inst Informat Syst & Applicat, Hsinchu, Taiwan
关键词
mutual authentication; RFID system; privacy; tag anonymity; location privacy; forward secrecy; quadratic residue assumption;
D O I
10.1016/j.comnet.2008.04.016
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In 2004, Ari Juels proposed a Yoking-Proofs protocol for RFID systems. Their aim is to permit a pair of tags to generate a proof which is verifiable off-line by a trusted entity even when the readers are potentially untrusted. However, we found that their protocol does not possess the anonymity property but also suffers from both known-plaintext attack and replay attack. Wong et al. [Kirk H.M. Wong, Patrick C.L. Hui, Allan C.K. Chan, Cryptography and authentication on RFID passive tags for apparel products, Computer in Industry 57 (2005) 342-349] proposed an authentication scheme for RFID passive tags, attempting to be a standard for apparel products. Yet, to our review, their protocol suffers from guessing parameter attack and replay attack. Moreover, both of the schemes have the common weakness: the backend server must use brute search for each tag's authentication. In this paper, we first describe the weaknesses in the two above-mentioned protocols. Then, we propose a novel efficient scheme which not only achieve the mutual authentication between the server and the tag but also can satisfy all the security requirements needed in an RFID system. © 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:2373 / 2380
页数:8
相关论文
共 20 条
[1]  
[Anonymous], 2005, P 3 ACM WORKSH SEC A, DOI [10.1145/1102219.1102229, DOI 10.1145/1102219.1102229]
[2]  
[Anonymous], INT C RFID SEC RFIDS
[3]  
Avoine G., 2005, 12 ANN WORKSH SEL AR
[4]  
BURMESTER M, 2007, ROBUST ANONYMOUS RFI
[5]  
CHIEN HY, 2006, MUTUAL AUTHENTICATIO
[6]  
Duc D N, 2006, 2006 S CRYPT INF SEC
[7]  
Henrici D, 2004, SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, P149
[8]  
Juels A, 2004, SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, P138
[9]  
Molnar D., 2004, C COMP COMM SEC ACM, P210, DOI DOI 10.1145/1030083.1030112
[10]  
OHKUBO TM, 2003, RFID PRIV WORKSH