SRFID: A hash-based security scheme for low cost RFID systems

被引:18
|
作者
Khedr, Walid I. [1 ]
机构
[1] Zagazig Univ, Fac Comp & Informat, Dept Informat Technol, Zagazig 44519, Egypt
关键词
RFID; Auhentication; Hash function; Privacy; Security;
D O I
10.1016/j.eij.2013.02.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Radio Frequency Identification (RFID) technology is a promising technology. It uses radio waves to identify objects. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. However, this ubiquitous technology has inherited problems in security and privacy, due to the powerful tracking capability of the tags. This paper proposes a new simple, low cost, and scalable security scheme relying on one-way hash functions and synchronized secret information. The proposed scheme provides a two steps mutual authentication between the backend server and the tag which does not require a secure channel between the tag reader and the backend server to complete the authentication process. The proposed scheme meets the requirements for tag delegation and secure tag ownership transfer. The general idea is to change the ID of a tag on every read attempt in a secure and synchronized manner. This means that attempts like eavesdropping, replay attacks, tag cloning, tag tracing, denial of service attack, or man-in-the-middle attacks cannot compromise the scheme. Our analysis results show that the proposed scheme outperforms existing schemes in terms of security and performance. (C) 2013 Faculty of Computers and Information, Cairo University. Production and hosting by Elsevier B.V. All rights reserved.
引用
收藏
页码:89 / 98
页数:10
相关论文
共 50 条
  • [31] A lattice based authentication for low-cost RFID
    El Moustaine, Ethmane
    Laurent, Maryline
    2012 IEEE INTERNATIONAL CONFERENCE ON RFID-TECHNOLOGIES AND APPLICATIONS (RFID-TA), 2012,
  • [33] Research on RFID Security Authentication Protocol Based on HASH Function
    Chen, Zhen-huan
    Pan, Xue-feng
    2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 251 - 255
  • [34] A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection
    Lim, Jihwan
    Oh, Heekuck
    Kim, Sangjin
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2008, 4991 : 278 - +
  • [35] Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
    Cho, Jung-Sik
    Yeo, Sang-Soo
    Kim, Sung Kwon
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 391 - 397
  • [36] Security Analysis of the Newest ID-Transfer Scheme for Low-Cost RFID Tags
    Yang, YuanYuan
    Ma, WenPing
    Liu, WeiBo
    Jiang, Qi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (10) : 1837 - 1839
  • [37] Cellular automata-based authentication for low-cost RFID systems
    Tripathy, S.
    Nandi, S.
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2009, 3 (03) : 199 - 216
  • [38] Cryptographic Algorithm Approach for Low Cost RFID Systems
    Labbi, Zouheir
    Maarof, Ahmed
    Senhadji, Mohamed
    Belkasmi, Mostafa
    PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015, VOL 1, 2016, 380 : 45 - 54
  • [39] Research on a provable security RFID authentication protocol based on Hash function
    Yu Yinhui
    Zhang Lei
    The Journal of China Universities of Posts and Telecommunications, 2016, (02) : 31 - 37
  • [40] Minimize the Secret Storeage - A New Economical Scheme for Identifing Low-cost RFID Tags
    Li, Tong-liang
    Jin, Zhi-gang
    Si, Xiao-kun
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,