An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection

被引:0
|
作者
Shen, Jian [1 ,2 ]
Tan, Haowen [2 ]
Zheng, Yuhui [2 ]
Ji, Sai [2 ]
Wang, Jin [2 ]
机构
[1] Nanjing Univ Informat Sci Technol, Sch Comp & Software, Jiangsu Engn Ctr Network Monitoring, Nanjing 210044, Peoples R China
[2] Nanjing Univ Informat Sci Technol, Jiangsu Technol Engn Ctr Meteorol Sensor Network, Nanjing 210044, Jiangsu, Peoples R China
来源
INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014) | 2015年 / 274卷
关键词
RFID; de-synchronization attack; ID updating; SECURITY;
D O I
10.3233/978-1-61499-484-8-2070
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RFID authentication has many security and privacy issues due to the lightweight operation. Many research achievements in RFID focus on strengthening the entire system and solving the security problems. Recently, a hash-based RFID security protocol with the purpose of updating the identifier of the tag in both the reader side and the tag side was proposed. However, there exists inherent risk in the ID-updating when the adversary blocks the message, where the backend processing system (BPS) cannot recognize the tag due to desynchronization of the identifier in last several sessions. In this paper, we propose an enhanced ID-updating hash-based RFID authentication protocol with strong privacy protection, in which ID-updating is able to resist de-synchronization attack. The possible feedbacks in our protocol are taken into consideration. Our proposed protocol is proved to be effective and secure in real applications.
引用
收藏
页码:2070 / 2079
页数:10
相关论文
共 50 条
  • [21] A Security RFID Authentication Protocol Based on Hash Function
    Yu Tian-tian
    Feng Quan-yuan
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 804 - 807
  • [22] RFID authentication protocol for anti-counterfeiting and privacy protection
    Chen, Yung-Chin
    Wang, Wei-Lin
    Hwang, Min-Shiang
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 255 - 259
  • [23] A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems
    Deebak, B. D.
    Al-Turjman, Fadi
    Mostarda, Leonardo
    SENSORS, 2019, 19 (18)
  • [24] Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol
    Da-Zhi Sun
    Ji-Dong Zhong
    Wireless Personal Communications, 2016, 91 : 1085 - 1093
  • [25] Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
    Cho, Jung-Sik
    Yeo, Sang-Soo
    Kim, Sung Kwon
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 391 - 397
  • [26] Privacy Enhanced Authentication Protocol for RFID Tag System Security
    Yeo, Sang-Soo
    Kwak, Jin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (09): : 1 - 6
  • [27] Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code
    Woo-Sik, Bae
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (04) : 2595 - 2609
  • [28] Lightweight RFID Privacy Protocol Based on Universal Hash Function
    Gao, Shu-jing
    Zhang, Rui-quan
    PROCEEDINGS OF THE 5TH INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING, 2015, 80 : 71 - 73
  • [29] An Enhanced Security Authentication Protocol Based on Hash-Lock for Low-cost RFID
    Ouyang Changqing
    Wu Jixiong
    Li Zhengyan
    Huang Shengye
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 416 - +
  • [30] A Low-cost RFID Authentication Protocol with Location Privacy Protection
    Chen, Yu-Yi
    Lu, Jun-Chao
    Chen, Shin-, I
    Jan, Jinn-Ke
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 109 - +