TY - GEN
T1 - An enhanced ID-updating hash-based RFID authentication protocol with strong privacy protection
AU - Shen, Jian
AU - Tan, Haowen
AU - Zheng, Yuhui
AU - Ji, Sai
AU - Wang, Jin
N1 - Publisher Copyright:
© 2015 The authors and IOS Press. All rights reserved.
PY - 2015
Y1 - 2015
N2 - RFID authentication has many security and privacy issues due to the lightweight operation. Many research achievements in RFID focus on strengthening the entire system and solving the security problems. Recently, a hash-based RFID security protocol with the purpose of updating the identifier of the tag in both the reader side and the tag side was proposed. However, there exists inherent risk in the ID-updating when the adversary blocks the message, where the backend processing system (BPS) cannot recognize the tag due to de-synchronization of the identifier in last several sessions. In this paper, we propose an enhanced ID-updating hash-based RFID authentication protocol with strong privacy protection, in which ID-updating is able to resist de-synchronization attack. The possible feedbacks in our protocol are taken into consideration. Our proposed protocol is proved to be effective and secure in real applications.
AB - RFID authentication has many security and privacy issues due to the lightweight operation. Many research achievements in RFID focus on strengthening the entire system and solving the security problems. Recently, a hash-based RFID security protocol with the purpose of updating the identifier of the tag in both the reader side and the tag side was proposed. However, there exists inherent risk in the ID-updating when the adversary blocks the message, where the backend processing system (BPS) cannot recognize the tag due to de-synchronization of the identifier in last several sessions. In this paper, we propose an enhanced ID-updating hash-based RFID authentication protocol with strong privacy protection, in which ID-updating is able to resist de-synchronization attack. The possible feedbacks in our protocol are taken into consideration. Our proposed protocol is proved to be effective and secure in real applications.
UR - http://www.scopus.com/inward/record.url?scp=84926444378&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84926444378&partnerID=8YFLogxK
U2 - 10.3233/978-1-61499-484-8-2070
DO - 10.3233/978-1-61499-484-8-2070
M3 - Conference contribution
AN - SCOPUS:84926444378
T3 - Frontiers in Artificial Intelligence and Applications
SP - 2070
EP - 2079
BT - Intelligent Systems and Applications - Proceedings of the International Computer Symposium, ICS 2014
A2 - Chu, William Cheng-Chung
A2 - Yang, Stephen Jenn-Hwa
A2 - Chao, Han-Chieh
PB - IOS Press
T2 - International Computer Symposium, ICS 2014
Y2 - 12 December 2014 through 14 December 2014
ER -