Advanced Constantly Updated Rfid Access Control Protocol Using Challenge-response and Indefinite-index

نویسندگان

  • Zi-Yao Cheng
  • Yun Liu
  • Chin-Chen Chang
  • Shih-Chang Chang
چکیده

Radio Frequency Identification (RFID), which can be implemented in various applications, has become one of the most popular technologies for remote, automatic identification. Currently, many scientific researchers are focused on this issue with the goal of achieving high security and privacy protection. Recently, Chen et al. proposed an RFID access control protocol that can satisfy the practical requirements of the authentication mechanism and infrastructure for access authorization. In this paper, we demonstrate that Chen et al.’s protocol cannot validate the legitimacy of tag when replay attacks occur. Moreover, our analysis indicated that location privacy and forward secrecy are not well protected in this protocol. To surmount the above weaknesses, we propose an advanced RFID access control protocol based on challenge-response, and its novel improvements make the proposed protocol more secure, efficient, practicable, and suitable for limited-power RFID systems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of Chen et al.'s RFID Access Control Protocol

Recently Chen et al. have proposed a RFID access control protocol based on the strategy of indefinite-index and challenge-response. They have claimed that their protocol provides optimal location privacy and resists against man in the middle, spoofed tag and spoofed reader attacks. However, in this paper we show that Chen et al. protocol does not provide the claimed security. More precisely, we...

متن کامل

Improvement of Two Lightweight RFID Authenti- cation Protocols

Recently, lightweight RFID authentication protocol has been investigated due to the awareness of practical requirements on individual privacy, system security and resource limitation of low cost tags. Research community demonstrates major advancements in this interesting research area of designing a robust access control and information retrieval mechanism for RFID system. In 2008, two well-stu...

متن کامل

Probabilistic privacy leakage from Challenge-Response RFID authentication protocols

To assure the privacy of RFID Tags, symmetric challenge-response identification protocols have been considered. Due to the low cost requirements for tags, it has been assumed that the tampering of RFID tags is possible. In this paper, we estimate the privacy leakage of challenge-response RFID authentication protocols based on symmetric key using discrete probability under the assumption that ta...

متن کامل

An Advanced Mutual-Authentication Algorithm Using AES for RFID Systems

The biggest challenge for current RFID technology is to provide the necessary benefits while avoiding any threats to the privacy of its users. Although many solutions to this problem have been proposed, almost as soon as they have been introduced, methods have been found to circumvent system security and make the user vulnerable. We are proposing an advanced mutualauthentication protocol betwee...

متن کامل

Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures

The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and readers, granting access to data, and revocation of readers turn into an administrative challenge. In this paper, we propose a new public-key-based mutual authentication protocol that addresses the reader revocation problem whil...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012