Skip to main content

A Synchronization Strengthen RFID Authentication Protocol Based on Key Array

  • Conference paper
  • 3433 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7530))

Abstract

If traditional RFID privacy authentication protocols are applied to multi-server environment, such as RFID credit card system and supply chain, the tags will be vulnerable to insider attack, an attacks from an internal legal entity who impersonates as another legal entity to do authority-exceeding violation. In 2011, H.Ning, et.al’s proposed a RFID authentication protocol based on key array to prevent authority-exceeding violation. But their scheme adopts static key mechanism, which may be a security risk. In this paper, we proposed an improved scheme that use key array to avoid insider attack. Furthermore, counter are also employed to resolve synchronization issue. The security analysis demonstrates that our protocol is reliable in advanced RFID systems. Additionally, the performance is evaluated and compared with other related protocols to show that our protocol can improve the reliability and efficiency of RFID systems with insignificantly increased complexity.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Miles, S.B., Sarma, S.E., Williams, J.R.: RFID Technology and Applications. Cambridge University Press, New York (2008)

    Book  Google Scholar 

  2. Yao, X., Dai, H., Zhang, Z., Ge, D., Chen, Y.: RFID-enhanced integrated manufacturing for job-shop floor problems. ICIC Express Letters, Part B: Applications 2(2), 319–324 (2011)

    Google Scholar 

  3. Lu, M.C., Ku, C.Y., Hwang, L.C., Chao, H.M.: Using smart card in RFID infrastructure to protect consumer privacy. International Journal of Innovative Computing, Information and Control 7(4), 1777–1788 (2011)

    Google Scholar 

  4. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  5. Juels, A.: RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communication 24(2), 381–394 (2006)

    Article  MathSciNet  Google Scholar 

  6. Lin, I.C., Wang, C.W., Luo, R.K., You, H.C.: An efficient mutual authentication protocol for RFID systems. International Journal of Innovative Computing, Information and Control 7(6), 3097–3106 (2011)

    Google Scholar 

  7. Lim, J., Oh, H., Kim, S.: A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 278–289. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  8. Yang, J., Park, J., Lee, H., Ren, K., Kim, K.: Mutual authentication protocol for low cost RFID. In: Proc. of the Workshop on RFID and Lightweight Cryptography, pp. 17–24 (2005)

    Google Scholar 

  9. Chen, Y., Chou, J.S., Sun, H.M.: A novel mutual-authentication scheme based on quadratic residues for RFID systems. Computer Networks 52(12), 2373–2380 (2008)

    Article  MATH  Google Scholar 

  10. Lin, I.C., Yang, C.W., Tsaur, S.C.: Nonidentifiable rfid privacy protection with ownership transfer. International Journal of Innovative Computing, Information and Control 6(5), 2341–2351 (2010)

    Google Scholar 

  11. Yeh, T.C., Wu, C.H., Tseng, Y.M.: Improvement of the RFID authentication scheme based on quadratic residues. Computer Communications 34(3), 337–341 (2011)

    Article  Google Scholar 

  12. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. In: Denko, M.K., Shih, C.-S., Li, K.-C., Tsao, S.-L., Zeng, Q.-A., Park, S.H., Ko, Y.-B., Hung, S.-H., Park, J.-H. (eds.) EUC-WS 2007. LNCS, vol. 4809, pp. 781–794. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  13. Ning, H., Liu, H., Mao, J., et al.: Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems. IET Communications 5(12), 1755–1768 (2011)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bai, Y., Liu, Y. (2012). A Synchronization Strengthen RFID Authentication Protocol Based on Key Array. In: Lei, J., Wang, F.L., Deng, H., Miao, D. (eds) Artificial Intelligence and Computational Intelligence. AICI 2012. Lecture Notes in Computer Science(), vol 7530. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33478-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33478-8_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33477-1

  • Online ISBN: 978-3-642-33478-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics