RFID authentication protocol design via BAN logic
نویسندگان
چکیده
Tag cost and privacy of RFID technology are two main factors that determine whether it will be applied to Internet of Things on a large scale. Recently, RFID industry and research community have focused on RFID authentication protocols with provable privacy and low tag cost. In this paper, we propose an RFID security protocol that achieves all security requirements based on a hash function and XOR operations. In addition, BAN logic was used to do the formal analysis and proved that the proposed protocol is safe and reachable. The RFID technology is widely used for industrial and individual applications. In the latest design of RFID system, the mobile handheld reader generally is adopted, so considering the RFID system's security and efficiency, we should consider two aspects’ security of reader and tags at the same time in the proposed protocol. The ensuring strong privacy has been an enormous challenge due to extremely inadequate computational power of typical RFID tags. In the proposed protocol, to achieve mutual authentication between the server and the Tags, at the same time we also achieve mutual authentication between the server and the mobile reader.
منابع مشابه
A Novel RFID Authentication Protocol with Ownership Transfer
During recent years,RFID technology has a wide applications in many fields.Since singnal transmit by the radio frequency, it raises many security and privacy concerns. Ownership transfer of RFID tags is another requriement for RFID systems. During the life of tag, it may pass from manufacutrer to commercial agent, the ownership of tag need change correspondingly.Taking into account the natural ...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملHash based Server/Serverless Adaptive and Mutual Authentication Protocol of RFID
To solve the problems about securities, absence of calculation pertinence, incapability of making the most of the reader’s computation and storage capacity that emerged in Radio Frequency Identification (RFID) authentication protocols, the paper proposes a Hash function based server/serverless adaptive and mutual authentication protocol of RFID based on the analysis of RFID authentication proto...
متن کاملSecurity Improvement in Authentication Protocol for Gen-2 Based RFID System
The EPC Class-1 Generation-2 specification(Gen-2 in brief) is widely accepted as the standard for RFID tags under grant number ISO18000-6c. However, there are two problems in view of its security authentication protocols. First of all, there is no unified standard for the security requirements, such as which threats should be protected against. Secondly, there is no widely acceptable means to g...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کامل