SRFID: A hash-based security scheme for low cost RFID systems

被引:18
|
作者
Khedr, Walid I. [1 ]
机构
[1] Zagazig Univ, Fac Comp & Informat, Dept Informat Technol, Zagazig 44519, Egypt
关键词
RFID; Auhentication; Hash function; Privacy; Security;
D O I
10.1016/j.eij.2013.02.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Radio Frequency Identification (RFID) technology is a promising technology. It uses radio waves to identify objects. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. However, this ubiquitous technology has inherited problems in security and privacy, due to the powerful tracking capability of the tags. This paper proposes a new simple, low cost, and scalable security scheme relying on one-way hash functions and synchronized secret information. The proposed scheme provides a two steps mutual authentication between the backend server and the tag which does not require a secure channel between the tag reader and the backend server to complete the authentication process. The proposed scheme meets the requirements for tag delegation and secure tag ownership transfer. The general idea is to change the ID of a tag on every read attempt in a secure and synchronized manner. This means that attempts like eavesdropping, replay attacks, tag cloning, tag tracing, denial of service attack, or man-in-the-middle attacks cannot compromise the scheme. Our analysis results show that the proposed scheme outperforms existing schemes in terms of security and performance. (C) 2013 Faculty of Computers and Information, Cairo University. Production and hosting by Elsevier B.V. All rights reserved.
引用
收藏
页码:89 / 98
页数:10
相关论文
共 50 条
  • [41] Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm
    Lijun Gao
    Lu Zhang
    Maode Ma
    Wireless Personal Communications, 2017, 96 : 683 - 696
  • [42] Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm
    Gao, Lijun
    Zhang, Lu
    Ma, Maode
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 683 - 696
  • [43] A secure and lightweight hash-based mutual authentication scheme in fog-assisted healthcare network
    Verma, Upendra
    Gianey, Hemant Kumar
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2024, 17 (3-4) : 200 - 212
  • [44] Design of a Security Protocol for Low-cost RFID
    Xu, Yuanzhong
    He, Zhangqing
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [45] A Revised One-way Hash based Low-cost Authentication Protocol In RFID System
    Jiang Zhi-wei
    Shao Xiao-yan
    He Lei
    Zhang Tao
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3774 - +
  • [46] A Study on Hash Chain-based Hadoop Security Scheme
    Jung, Young-Ae
    Woo, Si-Jae
    Yeo, Sang-Soo
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 1831 - 1835
  • [47] Security and privacy on low-cost radio frequency identification systems
    Sun L.
    International Journal of Security and Networks, 2010, 5 (2-3) : 128 - 134
  • [48] Blockchain-based Mutual Authentication Security Protocol for Distributed RFID Systems
    Wang, Siye
    Zhu, Shaoyi
    Zhang, Yanfang
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 74 - 77
  • [49] Providing Strong Security and High Privacy in Low-Cost RFID Networks
    David, Mathieu
    Prasad, Neeli R.
    SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 172 - 179
  • [50] A Kind of Effective Protection of Privacy and Low Cost RFID Security Authentication Protocol
    Fu, Tian
    Wang, Zhen
    Yang, PanDeng
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 1882 - 1886