An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection

被引:0
|
作者
Shen, Jian [1 ,2 ]
Tan, Haowen [2 ]
Zheng, Yuhui [2 ]
Ji, Sai [2 ]
Wang, Jin [2 ]
机构
[1] Nanjing Univ Informat Sci Technol, Sch Comp & Software, Jiangsu Engn Ctr Network Monitoring, Nanjing 210044, Peoples R China
[2] Nanjing Univ Informat Sci Technol, Jiangsu Technol Engn Ctr Meteorol Sensor Network, Nanjing 210044, Jiangsu, Peoples R China
来源
INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014) | 2015年 / 274卷
关键词
RFID; de-synchronization attack; ID updating; SECURITY;
D O I
10.3233/978-1-61499-484-8-2070
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RFID authentication has many security and privacy issues due to the lightweight operation. Many research achievements in RFID focus on strengthening the entire system and solving the security problems. Recently, a hash-based RFID security protocol with the purpose of updating the identifier of the tag in both the reader side and the tag side was proposed. However, there exists inherent risk in the ID-updating when the adversary blocks the message, where the backend processing system (BPS) cannot recognize the tag due to desynchronization of the identifier in last several sessions. In this paper, we propose an enhanced ID-updating hash-based RFID authentication protocol with strong privacy protection, in which ID-updating is able to resist de-synchronization attack. The possible feedbacks in our protocol are taken into consideration. Our proposed protocol is proved to be effective and secure in real applications.
引用
收藏
页码:2070 / 2079
页数:10
相关论文
共 50 条
  • [31] Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol
    Cho, Jung-Sik
    Jeong, Young-Sik
    Park, Sang Oh
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2015, 69 (01) : 58 - 65
  • [32] Hash based server/serverless adaptive and mutual authentication protocol of RFID
    Wang, Guowei
    Jia, Zongpu
    Peng, Weiping
    Open Cybernetics and Systemics Journal, 2015, 9 (01): : 483 - 490
  • [33] An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol
    Ren, Xuping
    Xu, Xianghua
    Li, Yunfa
    JOURNAL OF COMPUTERS, 2013, 8 (09) : 2405 - 2412
  • [34] A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living
    Wang, Xingmiao
    Fan, Kai
    Yang, Kan
    Cheng, Xiaochun
    Dong, Qingkuan
    Li, Hui
    Yang, Yintang
    COMPUTER COMMUNICATIONS, 2022, 186 : 121 - 132
  • [35] Vulnerabilities in Chen and Deng's RFID mutual authentication and privacy protection protocol
    Kapoor, Gaurav
    Piramuthu, Selwyn
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2011, 24 (07) : 1300 - 1302
  • [36] A Kind of Effective Protection of Privacy and Low Cost RFID Security Authentication Protocol
    Fu, Tian
    Wang, Zhen
    Yang, PanDeng
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 1882 - 1886
  • [37] A Secure and Privacy Friendly ECC Based RFID Authentication Protocol for Practical Applications
    Atakan Arslan
    Sultan Aldırmaz Çolak
    Sarp Ertürk
    Wireless Personal Communications, 2021, 120 : 2653 - 2691
  • [38] A Secure and Privacy Friendly ECC Based RFID Authentication Protocol for Practical Applications
    Arslan, Atakan
    Colak, Sultan Aldirmaz
    Erturk, Sarp
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 120 (04) : 2653 - 2691
  • [39] Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication
    Li, Yang
    Mikami, Shugo
    Watanabe, Dai
    Ohta, Kazuo
    Sakiyama, Kazuo
    RADIO FREQUENCY IDENTIFICATION SYSTEM SECURITY, 2014, 12 : 3 - 15
  • [40] RFID mutual-authentication protocol with synchronous updatedkeys based on Hash function
    Zhang Xiaohong
    Hu Yingmeng
    The Journal of China Universities of Posts and Telecommunications, 2015, (06) : 27 - 35