Advanced Constantly Updated Rfid Access Control Protocol Using Challenge-response and Indefinite-index
نویسندگان
چکیده
Radio Frequency Identification (RFID), which can be implemented in various applications, has become one of the most popular technologies for remote, automatic identification. Currently, many scientific researchers are focused on this issue with the goal of achieving high security and privacy protection. Recently, Chen et al. proposed an RFID access control protocol that can satisfy the practical requirements of the authentication mechanism and infrastructure for access authorization. In this paper, we demonstrate that Chen et al.’s protocol cannot validate the legitimacy of tag when replay attacks occur. Moreover, our analysis indicated that location privacy and forward secrecy are not well protected in this protocol. To surmount the above weaknesses, we propose an advanced RFID access control protocol based on challenge-response, and its novel improvements make the proposed protocol more secure, efficient, practicable, and suitable for limited-power RFID systems.
منابع مشابه
Cryptanalysis of Chen et al.'s RFID Access Control Protocol
Recently Chen et al. have proposed a RFID access control protocol based on the strategy of indefinite-index and challenge-response. They have claimed that their protocol provides optimal location privacy and resists against man in the middle, spoofed tag and spoofed reader attacks. However, in this paper we show that Chen et al. protocol does not provide the claimed security. More precisely, we...
متن کاملImprovement of Two Lightweight RFID Authenti- cation Protocols
Recently, lightweight RFID authentication protocol has been investigated due to the awareness of practical requirements on individual privacy, system security and resource limitation of low cost tags. Research community demonstrates major advancements in this interesting research area of designing a robust access control and information retrieval mechanism for RFID system. In 2008, two well-stu...
متن کاملProbabilistic privacy leakage from Challenge-Response RFID authentication protocols
To assure the privacy of RFID Tags, symmetric challenge-response identification protocols have been considered. Due to the low cost requirements for tags, it has been assumed that the tampering of RFID tags is possible. In this paper, we estimate the privacy leakage of challenge-response RFID authentication protocols based on symmetric key using discrete probability under the assumption that ta...
متن کاملAn Advanced Mutual-Authentication Algorithm Using AES for RFID Systems
The biggest challenge for current RFID technology is to provide the necessary benefits while avoiding any threats to the privacy of its users. Although many solutions to this problem have been proposed, almost as soon as they have been introduced, methods have been found to circumvent system security and make the user vulnerable. We are proposing an advanced mutualauthentication protocol betwee...
متن کاملEfficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and readers, granting access to data, and revocation of readers turn into an administrative challenge. In this paper, we propose a new public-key-based mutual authentication protocol that addresses the reader revocation problem whil...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012