Advanced Search
Volume 38 Issue 2
Feb.  2016
Turn off MathJax
Article Contents
SHI Leyi, JIA Cong, GONG Jian, LIU Xin, CHEN Honglong. RFID Mutual Authentication Protocol on Pseudo-random Hash Function with Shared Secrets[J]. Journal of Electronics & Information Technology, 2016, 38(2): 361-366. doi: 10.11999/JEIT150653
Citation: SHI Leyi, JIA Cong, GONG Jian, LIU Xin, CHEN Honglong. RFID Mutual Authentication Protocol on Pseudo-random Hash Function with Shared Secrets[J]. Journal of Electronics & Information Technology, 2016, 38(2): 361-366. doi: 10.11999/JEIT150653

RFID Mutual Authentication Protocol on Pseudo-random Hash Function with Shared Secrets

doi: 10.11999/JEIT150653
Funds:

The National Natural Science Foundation of China (61309024), The Funding of Shanghai Key Laboratory of Financial Information Technology (2015), Shandong Provincial Key Program of Research and Development (2015GGX191945)

  • Received Date: 2015-06-01
  • Rev Recd Date: 2015-11-08
  • Publish Date: 2016-02-19
  • Concerning the resource-limited RFID tags, this paper presents a lightweight mutual authentication scheme based on Hash function, combining with the pseudo-random number and shared secret mechanisms, and implements the mutual authentication among the end database, reader and the tags. The anti-attack performance and the overhead of the scheme are analyzed in detail. Afterwards, the protocol security model is formalized using BAN logical analysis method. Theoretical analysis shows that the proposed authentication scheme could achieve the desired security goals, has good anti-attack performance and high efficiency. It can be applied to big population RFID since its low overhead for RFID tags.
  • loading
  • HUANG H F, YU P K, and LIU K C. A privacy and authentication protocol for mobile RFID system[C]. 2014 IEEE International Symposium on Independent Computing, IEEE, Orlando, USA, 2014: 1-6.
    NYALAMADUGU S, LIU J, and DE VELASCO CORTINA F M. Methods and apparatus for preserving privacy in an RFID system[P]. U.S. Patent 8710960. 2014.
    LI N, MU Y, SUSILO W, et al. Privacy-preserving Authorized RFID Authentication Protocols[M]. Radio Frequency Identification: Security and Privacy Issues. Springer International Publishing, Berlin, Germany, 2014: 108-122.
    PERIS-LOPEZ P, ORFILA A, PALOMAR E, et al. A secure distance-based RFID identification protocol with an off-line back-end database[J]. Personal and Ubiquitous Computing, 2012, 16(3): 351-365.
    HAN S, DILLON T, POTDAR V, et al. RFID mutual authentication protocols for tags and readers with and without a server[J]. Computer Systems Science and Engineering, 2013, 28(2): 91-99.
    CHO J S, YEO S S, and KIM S K. Securing against brute- force attack: A hash-based RFID mutual authentication protocol using a secret value[J]. Computer Communications, 2011, 34(3): 391-397.
    CHO J S, JEONG Y S, and PARK S O. Consideration on the brute-force attack cost and retrieval cost: A hash-based radio- frequency identification (RFID) tag mutual authentication protocol[J]. Computers Mathematics with Applications, 2012: 1-8.
    Kim H. RFID mutual authentication protocol based on synchronized secret[J]. International Journal of Security Its Applications, 2013, 7(4): 37-49.
    SAFKHANI M, PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, et al. Cryptanalysis of the Cho et al. protocol: a hash-based RFID tag mutual authentication protocol[J]. Journal of Computational and Applied Mathematics, 2014, 259: 571-577.
    周晔. 基于Hash链的RFID双向认证协议研究[D]. [硕士论文], 西南交通大学, 2012.
    ZHOU Y. Research on RFID mutual authentication protocol based on Hash chain[D]. [Master dissertation], South West Jiaotong University, 2012.
    丁振华, 李锦涛, 冯波. 基于 Hash 函数的 RFID 安全认证协议研究[J]. 计算机研究与发展, 2009, 46(4): 583-592.
    DING Z, LI J, and FENG B. Research on Hash-based RFID security authentication protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.
    孙肖, 赵泽茂. 一种基于哈希函数的RFID双向认证协议[J]. 杭州电子科技大学学报, 2012, 32(6): 29-32.
    SUN X and ZHAO Z. A Hash-based mutual authentication protocol for the RFID system[J]. Journal of Hangzhou Dianzi University, 2012, 32(6): 29-32.
    蔡豪. RFID安全认证协议的研究与设计[D]. [硕士论文], 华中科技大学, 2010.
    CAI H. Studies on RFID security authentication protocol[D]. [Master dissertation], Huazhong University of Science Technology, 2010.
    李斌. RFID安全协议的研究[D]. [硕士论文], 复旦大学, 2012.
    LI B. Research on RFID security protocol[D]. [Master dissertation], Fudan University, 2012.
    信息技术射频识别800/900 MHz空中接口协议[S]. 北京: 中国标准出版社, 2013, GB/T29768-2013.
    Information technology-radio frequency identification air interface protocol at 800/900 MHz[S]. Beijing: Standards Press of China, 2013, GB/T 29768-2013.
    WANG J, FLOERKEMEIER C, and SARMA S E. Session-based security enhancement of RFID systems for emerging open-loop applications[J]. Personal and Ubiquitous Computing, 2014, 18(8): 1881-1891.
    MAMUN M S I and MIYAJI A. A privacypreserving efficient RFID authentication protocol from SLPN assumption[J]. International Journal of Computational Science and Engineering, 2015, 10(3): 234-243.
    SHOARINEJAD K and SOLTAN M. Systems and methods for RFID security[P]. U.S. Patent Application 14/592,455. 2015-1-8.
    BURROWS M, ABADI M, and NEEDHAM R M. A logic of authentication[C]. Proceedings of the Royal Society of London. A: Mathematical and Physical Sciences. The Royal Society, London, 1989, 426(1871): 233-271.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1480) PDF downloads(431) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return