An efficient and secure authentication protocol for RFID systems

This source preferred by Hongnian Yu

This data was imported from Scopus:

Authors: Morshed, M.M., Atkins, A. and Yu, H.N.

Journal: International Journal of Automation and Computing

Volume: 9

Issue: 3

Pages: 257-265

eISSN: 1751-8520

ISSN: 1476-8186

DOI: 10.1007/s11633-012-0642-4

The use of radio frequency identification (RFID) tags may cause privacy violation of users carrying an RFID tag. Due to the unique identification number of the RFID tag, the possible privacy threats are information leakage of a tag, traceability of the consumer, denial of service attack, replay attack and impersonation of a tag, etc. There are a number of challenges in providing privacy and security in the RFID tag due to the limited computation, storage and communication ability of low-cost RFID tags. Many research works have already been conducted using hash functions and pseudorandom numbers. As the same random number can recur many times, the adversary can use the response derived from the same random number for replay attack and it can cause a break in location privacy. This paper proposes an RFID authentication protocol using a static identifier, a monotonically increasing timestamp, a tag side random number and a hash function to protect the RFID system from adversary attacks. The proposed protocol also indicates that it requires less storage and computation than previous existing RFID authentication protocols but offers a larger range of security protection. A simulation is also conducted to verify some of the privacy and security properties of the proposed protocol. © 2012 Institute of Automation, Chinese Academy of Sciences and Springer-Verlag Berlin Heidelberg.

The data on this page was last updated at 04:55 on May 22, 2019.