ID Updating-Based RFID Mutual Authentication Protocol for Low-Cost Tags

被引:0
作者
Li Jian [1 ]
Song Danjie [1 ]
Guo Xiaojing [1 ]
Xie Feng [2 ]
Peng Yong [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Comp, Beijing 100876, Peoples R China
[2] China Informat Technol Secur Evaluat Ctr, Tech Assessment Res Lab, Beijing 100085, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; RFID; mutual authentication; ID updating; security analysis; performance evaluation; PING-PONG PROTOCOL; SECURITY;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In order to solve the various privacy and security problems in RFID system, a new low-cost RFID mutual authentication protocol based on ID updating mechanics is proposed. In the proposed scheme, the backend server keeps both the current ID and potential next ID for each tag, thus to solve the possible problem of de-synchronization attack in the most ID updating-based schemes. In the security analysis section, comparing several protocols in property required and attacker resistances, the comparison results show that the proposed protocol provides strong authentication and strong integrity of the transmissions and can withstand most the possible attacks that break the security of the previous schemes. In the performance evaluation section, the analysis results also indicate that, in terms of computational cost and storage requirement, the proposed scheme is safer, more efficient, more suitable for low-cost tag and more feasible in practice.
引用
收藏
页码:122 / 127
页数:6
相关论文
共 17 条
[1]  
[Anonymous], P S CRYPT INF SEC SC
[2]  
Bono SC, 2005, USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, P1
[3]  
Chien H.-Y., 2006, P 2006 INT WORKSH FU
[4]   Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards [J].
Chien, Hung-Yu ;
Chen, Che-Hao .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) :254-259
[5]  
CHIEN HY, 2007, ACM OPERATING SYSTEM, V41, P83
[6]  
Henrici D, 2004, SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, P149
[7]  
Juels A., 2005, P 1 INT C SEC PRIV E
[8]  
Juels A., 2005, INT C MOBILE COMPUTI, P67, DOI DOI 10.1145/1080793.1080805
[9]  
Li J, 2011, CHINESE J ELECTRON, V20, P457
[10]  
Li J, 2011, CHINA COMMUN, V8, P170