Hash based Server/Serverless Adaptive and Mutual Authentication Protocol of RFID
نویسندگان
چکیده
To solve the problems about securities, absence of calculation pertinence, incapability of making the most of the reader’s computation and storage capacity that emerged in Radio Frequency Identification (RFID) authentication protocols, the paper proposes a Hash function based server/serverless adaptive and mutual authentication protocol of RFID based on the analysis of RFID authentication protocol that using a backend server and without using a backend server. The protocol can automatically switches between the RFID authentication protocol with or without a backend server according to the application range of RFID tags. The BAN logic proof, security and efficiency performances analysis and comparison with other similar RIFD protocols presented by the paper show that the protocol can effectively meets the security requirements of RFID authentication protocols.
منابع مشابه
An Efficient Improvement on Safkhani et al.’s Hash-Based Mutual Authentication Protocol for RFID Systems
Nowadays, plenty of radio frequency identification (RFID) systems have been proposed and used in the real world for convenience. An RFID system requires advanced properties of confidentiality, indistinguishability, forward security and mutual authentication to provide a higher security level. Safkhani et al. proposed a hash-based authentication protocol for RFID systems. Though their protocol p...
متن کاملRFID authentication protocol design via BAN logic
Tag cost and privacy of RFID technology are two main factors that determine whether it will be applied to Internet of Things on a large scale. Recently, RFID industry and research community have focused on RFID authentication protocols with provable privacy and low tag cost. In this paper, we propose an RFID security protocol that achieves all security requirements based on a hash function and ...
متن کاملMutual Authentication Protocol for Low-cost RFID
Radio frequency identification (RFID) is the latest technology to play an important role for object identification as a ubiquitous infrastructure. However, current low-cost RFID tags are highly resource-constrained and cannot support its long-term security, so they have potential risks and may violate privacy for their bearers. To remove security vulnerabilities, we propose a robust mutual auth...
متن کاملVulnerabilities and Improvements on HRAP+, a Hash-Based RFID Authentication Protocol
In the last decade, Radio Frequency Identification (RFID) systems are employed in many authentications and identifications applications. In RFID systems, in order to provide secure authentication between RFID users, different authentication protocols proposed. In 2011, Cho et al. proposed a hash-based mutual RFID authentication protocol (HRAP). They claimed that HRAP protocol provides secure co...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015