An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection
نویسندگان
چکیده
RFID authentication has raised many concerns about the security risks and privacy issues due to its lightweight authentication properties. Many research achievements in RFID focus on strengthening the entire RFID system and solving the security problems. Recently, a hashbased RFID security protocol with the intension of updating the identifier of the tag in both the reader side and the tag side itself was proposed. However, there exists inherent risk in the IDupdating procedure. In the scenario that the adversary blocks the legal messages continuously for several times, the backend processing system (BPS) cannot recognize the tag due to the desynchronization of the identifier in last several sessions. Thus the tag will be invalid and cannot be reused again. In this paper, we propose an enhanced ID-updating hash-based RFID authentication protocol with strong privacy protection. In our protocol the ID-updating procedure is resistant to de-synchronization attack. Additionally, the possible feedbacks towards different cases of the tag are taken into consideration. Our proposed protocol is proved to be effective and secure in real applications. Above all, the de-synchronization attack towards the communication between the tag and reader can be prevented according to our design. The identifier of the RFID tag is assumed to be updated with cryptographic hash functions during every session. In this way the identifier can be synchronized in both the BPS side and the RFID tag side. The location privacy of the tag can be protected in our protocol.
منابع مشابه
HMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملSecurity Analysis of the RFID Authentication Protocol using Model Checking
In RFID security(Gildas), few mechanisms focus on data protection of the tags, message interception over the air channel, and eavesdropping within the interrogation zone of the RFID reader(Sarma et al.a)(Weis et al.). Among these issues, we will discuss two aspects on the risks posed to the passive party by RFID , which have so far been dominated by the topics of data protection associated with...
متن کاملA Highly Scalable RFID Authentication Protocol
In previous RFID protocols, a hash-chain is used to achieve good privacy. Each tag is associated with a chain of Q hash values. To identify one tag out of a total of N tags, a server searches a table of size NQ. A naive search takes either Θ(NQ) time or Θ(NQ) memory, and therefore it does not scale well. A time-space tradeoff technique can mitigate the scalability problem. However, with the tim...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014