An Efficient Mutual Authentication Protocol on RFID Tags
نویسنده
چکیده
Recently, as low-cost radio frequency identification (RFID) becomes more pervasive in our daily lives, RFID systems may create new threats to security and privacy of individuals and organizations. It must have secure mutual authentication mechanisms to protect privacy information. However, the previous works on designing security protocols for RFID either do not conform to the EPCglobal Class 1 Generation 2 (GEN-2) standards or suffer from security flaws. In 2007, Chien and Chen proposed a mutual authentication protocol for RFID systems to improve the previous schemes. However, their scheme cannot efficiently retrieve the information of tags from its database for the authentication. To guarantee the quality of the growing popular communication services, it is urgent to construct efficient authentication for both parties of the tag and the back-end server such that the reader can quickly obtain the information of tag from its database. For light-weight calculation power of a tag and protecting the privacy of user (or product), this article proposes the RFID mutual authentication scheme based on GEN-2 standards. The proposed scheme can efficiently retrieve the information of tags from the database in the authentication process. Moreover, the proposed scheme can improve the previous schemes and provide anonymous property and forward secrecy.
منابع مشابه
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملSecurity Analysis on Anonymous Mutual Authentication Protocol for RFID Tag without Back-End Database and its Improvement
RFID (Radio Frequency IDentification) system has been widely used in our life, such as transport systems, passports, automotive, animal tracking, human implants, library, and so on. However, the RFID authentication protocols between RF (Radio Frequency) tags and the RF readers have been bring about various privacy problems that anonymity of the tags, tracking, eavesdropping, and so on. Many res...
متن کاملEMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags
RFID tags are devices of very limited computational capabilities, which only have 250-3K logic gates that can be devoted to securityrelated tasks. Many proposals have recently appeared, but all of them are based on RFID tags using classical cryptographic primitives such as PRNGs, hash functions, block ciphers, etc. We believe this assumption to be fairly unrealistic, as classical cryptographic ...
متن کاملWide-weak Privacy Preserving RFID Mutual Authentication Protocol
Radio Frequency IDentification (RFID) systems are gaining enormous interests at industry due to their vast applications such as supply chain, access control, inventory, transport, health care and home appliances. Although tag identification is the primary security goal of an RFID system, privacy issue is equally, even more, important concern in RFID system because of pervasiveness of RFID tags....
متن کاملAn Improved Ownership Transfer and Mutual Authentication for Lightweight RFID Protocols
Radio Frequency Identification (RFID) technology is an automated identification technology which is widely used to identify and track all kind of objects. However, it is a challenging task to design an authentication protocol because of the limited resource of Lightweight RFID tags. Recently, a lightweight RFID authentication protocol and an ownership transfer of RFID tags are presented by Kuls...
متن کامل