An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection

被引:0
|
作者
Shen, Jian [1 ,2 ]
Tan, Haowen [2 ]
Zheng, Yuhui [2 ]
Ji, Sai [2 ]
Wang, Jin [2 ]
机构
[1] Nanjing Univ Informat Sci Technol, Sch Comp & Software, Jiangsu Engn Ctr Network Monitoring, Nanjing 210044, Peoples R China
[2] Nanjing Univ Informat Sci Technol, Jiangsu Technol Engn Ctr Meteorol Sensor Network, Nanjing 210044, Jiangsu, Peoples R China
来源
INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014) | 2015年 / 274卷
关键词
RFID; de-synchronization attack; ID updating; SECURITY;
D O I
10.3233/978-1-61499-484-8-2070
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RFID authentication has many security and privacy issues due to the lightweight operation. Many research achievements in RFID focus on strengthening the entire system and solving the security problems. Recently, a hash-based RFID security protocol with the purpose of updating the identifier of the tag in both the reader side and the tag side was proposed. However, there exists inherent risk in the ID-updating when the adversary blocks the message, where the backend processing system (BPS) cannot recognize the tag due to desynchronization of the identifier in last several sessions. In this paper, we propose an enhanced ID-updating hash-based RFID authentication protocol with strong privacy protection, in which ID-updating is able to resist de-synchronization attack. The possible feedbacks in our protocol are taken into consideration. Our proposed protocol is proved to be effective and secure in real applications.
引用
收藏
页码:2070 / 2079
页数:10
相关论文
共 50 条
  • [41] Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code
    Bae Woo-Sik
    Wireless Personal Communications, 2014, 79 : 2595 - 2609
  • [42] A Gen2-Based RFID Authentication Protocol for Security and Privacy
    Sun, Hung-Min
    Ting, Wei-Chih
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2009, 8 (08) : 1052 - 1062
  • [43] A New Dynamic ID-based RFID Mutual Authentication Protocol Providing Perfect Synchronization
    Lim, Jihwan
    Kim, Sangjin
    Oh, Heekuck
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (02): : 639 - 656
  • [44] Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol
    He, Debiao
    Kumar, Neeraj
    Chilamkurti, Naveen
    Lee, Jong-Hyouk
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (10)
  • [45] RFID Authentication and Communication Protocol based on the Dynamic Active Tag ID and Key
    Zhang Xiaohong
    Wang Huiqin
    Bo He
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 1913 - +
  • [46] A Symmetric Key based RFID Authentication Protocol using Encrypted Tag ID
    Shin, Juseok
    Park, Yongsoo
    Kim, Sungsoo
    Kim, Youngbak
    Kim, Kyungoul
    Choi, Wonseok
    Ahn, Kwangseon
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 851 - 852
  • [47] RFID Bi-directional Authentication Protocol Based on Random Number and Hash Function
    Liu Jian-dong
    Wang Ye-quan
    Zhang Xiao
    Shang Kai
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 919 - 922
  • [48] EFFICIENT DELEGATION-BASED AUTHENTICATION PROTOCOL WITH STRONG MOBILE PRIVACY
    Lu, Jian-Zhu
    Ren, Hong-Qing
    Zhou, Jiping
    2011 PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION NETWORKS AND SYSTEMS (WINSYS 2011), 2011, : 123 - 127
  • [49] A One-way Hash based Low-cost Authentication Protocol with Forward Security in RFID System
    He Lei
    Lu Xin-mei
    Jin Song-he
    Cai Zeng-yu
    2010 2ND INTERNATIONAL ASIA CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS (CAR 2010), VOL 2, 2010, : 269 - 272
  • [50] SYMMETRIC KEY BASED RFID AUTHENTICATION PROTOCOL WITH A SECURE KEY-UPDATING SCHEME
    Zhu, Guangyu
    Khan, Gul N.
    2013 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2013, : 353 - 357