A Mobile RFID Authentication Scheme Based on the COMP-128 Algorithm
نویسندگان
چکیده
Radio frequency identification (RFID), based on the MIT Auto-ID project [1], is a technology that uses wireless transmission to identify an object. RFID is seeing increased use in various industries as an alternative to the bar code. An RFID system consists of three components: the reader, the tag, and the back-end database. Some advantages of an RFID system are that it does not require direct contact with the tag, and can scan multiple tags simultaneously. However, because the reader uses wireless technology to communicate with the tag and the EPC Class 1 Gen 2 protocol [2] does not have a well-designed access mechanism to protect the tag data privacy and location privacy, a malicious attacker is able to retrieve the tag’s information by listening to the traffic between the reader and the tag [3]. To protect the information stored on a tag, Juels [5] and Weis [6] proposed methods for a tag to lock or destroy itself when attacked. However, these methods are an inconvenience to normal users. Many studies [7] propose authentication mechanisms in RFID systems, in which only authorized readers can read the correct information storing on the tag. However, due to hardware limitations, an RFID tag cannot perform complex operations, such as traditional symmetric and asymmetric encryption algorithms. Previous research proposes using the simple XOR operation to encrypt messages in RFID authentication protocols. Some studies use the RFID tag’s built-in CRC function to achieve message authentication [8]. Other studies [4][9][10][11] use the one-way hash function to enhance authentication protocol security. This study briefly explains these authentication mechanisms and analyzes existing security issues. Karthikeyan [12] proposed a mutual authentication scheme that uses two matrices and the corresponding anti-matrix. In this approach, the multiplication of a vector key and the matrix serves as an authentication index for the tag. However, in Karthikeyan’s scheme, the tag does not verify reader’s return value; that is, the attacker can re-send the message to track tag’s location. Duc [8] used the built-in CRC function of an RFID tag to generate a message authentication code (MAC) consisting of a random number and a secret previously shared between the tag and the reader. Duc uses the MAC to authenticate the tag and update the pre-shared secret. However, Duc’s scheme cannot prevent the forge attack and it does not have forward security. To enhance Karthikeyan and Duc’s scheme, Chien [13] proposed a synchronization Source: Radio Frequency Identification Fundamentals and Applications, Bringing Research to Practice, Book edited by: Cristina Turcu, ISBN 978-953-7619-73-2, pp. 278, February 2010, INTECH, Croatia, downloaded from SCIYO.COM
منابع مشابه
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملRole and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کاملA Secure and Efficient Authentication Protocol for Mobile RFID Systems
AbstrAct: The design of a secure communication scheme for Radio Frequency Identification (RFID) systems has been extensively studied in recent years in view of the awareness of individual privacy and the requirement of robust system security. Most of previous works assume the communication channel between an RFID reader and its backend server is secure and concentrate on the security enhancemen...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کامل