Cryptanalysis and improvement of a group RFID authentication protocol

被引:4
|
作者
Pakniat, Nasrollah [1 ]
Eslami, Ziba [2 ]
机构
[1] Iranian Res Inst Informat Sci & Technol IRANDOC, Informat Sci Res Ctr, Tehran, Iran
[2] Shahid Beheshti Univ, Dept Data & Comp Sci, GC, Tehran, Iran
关键词
RFID; Mutual authentication; Secret sharing; Cheater identification; CRYPTOGRAPHY;
D O I
10.1007/s11276-020-02266-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, radio frequency identification (RFID) systems have become popular for identification. The key technology to protect the security of RFID systems is mutual authentication between the tags and the server. To enhance the efficiency of RFID systems, recently, Liu et al. proposed a group authentication protocol based on the concept of secret sharing. In this paper, we show that Liu et al.'s protocol falls short of providing security requirements. More specifically, we prove that in their protocol, authenticity of the tags to the server can not be achieved and on top of that the scheme can not be used more than once. We further propose a group mutual authentication protocol for RFID tags to overcome the mentioned drawbacks and prove that our proposal is secure. The results of analyzing the performance of the proposed protocol and its comparison with existing literature indicate that it outperforms current secure RFID authentication protocols.
引用
收藏
页码:3363 / 3372
页数:10
相关论文
共 50 条
  • [1] Cryptanalysis and improvement of a group RFID authentication protocol
    Nasrollah Pakniat
    Ziba Eslami
    Wireless Networks, 2020, 26 : 3363 - 3372
  • [2] Cryptanalysis and Improvement of a Novel RFID Authentication Protocol for Medical Systems
    Xiao, Feng
    Hu, Xi
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2025, 19 (02): : 589 - 611
  • [3] Cryptanalysis of the LCSS RFID Authentication Protocol
    Cao, Tianjie
    Shen, Peng
    Bertino, Elisa
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 305 - +
  • [4] Cryptanalysis and improvement of a RFID authentication scheme
    Cao, Tianjie
    Zhang, Yongping
    Journal of Computational Information Systems, 2009, 5 (04): : 1177 - 1182
  • [5] Cryptanalysis of an RFID-Enabled Authentication Protocol for Healthcare
    Ghosh, Haradhan
    Maurya, Pramod Kumar
    Bagchi, Satya
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 138 (04) : 2613 - 2635
  • [6] Cryptanalysis and Improvement of Robust Deniable Authentication Protocol
    Fagen Li
    Tsuyoshi Takagi
    Wireless Personal Communications, 2013, 69 : 1391 - 1398
  • [7] Cryptanalysis and Improvement of Robust Deniable Authentication Protocol
    Li, Fagen
    Takagi, Tsuyoshi
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 69 (04) : 1391 - 1398
  • [8] Cryptanalysis and Improvement of RFID Ownership Transfer Protocol
    Chen, Xiuqing
    Zhao, Qiang
    Cao, Tianjie
    Zhai, Jingxuan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (12): : 165 - 173
  • [9] Cryptanalysis of the LMAP Protocol: A Low-cost RFID Authentication Protocol
    Li, Jing
    Zhou, Zhiping
    Wang, Ping
    2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2017, : 7292 - 7297
  • [10] Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol
    Sun, Da-Zhi
    Zhong, Ji-Dong
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) : 1085 - 1093