Abstract
If traditional RFID privacy authentication protocols are applied to multi-server environment, such as RFID credit card system and supply chain, the tags will be vulnerable to insider attack, an attacks from an internal legal entity who impersonates as another legal entity to do authority-exceeding violation. In 2011, H.Ning, et.al’s proposed a RFID authentication protocol based on key array to prevent authority-exceeding violation. But their scheme adopts static key mechanism, which may be a security risk. In this paper, we proposed an improved scheme that use key array to avoid insider attack. Furthermore, counter are also employed to resolve synchronization issue. The security analysis demonstrates that our protocol is reliable in advanced RFID systems. Additionally, the performance is evaluated and compared with other related protocols to show that our protocol can improve the reliability and efficiency of RFID systems with insignificantly increased complexity.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Miles, S.B., Sarma, S.E., Williams, J.R.: RFID Technology and Applications. Cambridge University Press, New York (2008)
Yao, X., Dai, H., Zhang, Z., Ge, D., Chen, Y.: RFID-enhanced integrated manufacturing for job-shop floor problems. ICIC Express Letters, Part B: Applications 2(2), 319–324 (2011)
Lu, M.C., Ku, C.Y., Hwang, L.C., Chao, H.M.: Using smart card in RFID infrastructure to protect consumer privacy. International Journal of Innovative Computing, Information and Control 7(4), 1777–1788 (2011)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)
Juels, A.: RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communication 24(2), 381–394 (2006)
Lin, I.C., Wang, C.W., Luo, R.K., You, H.C.: An efficient mutual authentication protocol for RFID systems. International Journal of Innovative Computing, Information and Control 7(6), 3097–3106 (2011)
Lim, J., Oh, H., Kim, S.: A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 278–289. Springer, Heidelberg (2008)
Yang, J., Park, J., Lee, H., Ren, K., Kim, K.: Mutual authentication protocol for low cost RFID. In: Proc. of the Workshop on RFID and Lightweight Cryptography, pp. 17–24 (2005)
Chen, Y., Chou, J.S., Sun, H.M.: A novel mutual-authentication scheme based on quadratic residues for RFID systems. Computer Networks 52(12), 2373–2380 (2008)
Lin, I.C., Yang, C.W., Tsaur, S.C.: Nonidentifiable rfid privacy protection with ownership transfer. International Journal of Innovative Computing, Information and Control 6(5), 2341–2351 (2010)
Yeh, T.C., Wu, C.H., Tseng, Y.M.: Improvement of the RFID authentication scheme based on quadratic residues. Computer Communications 34(3), 337–341 (2011)
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. In: Denko, M.K., Shih, C.-S., Li, K.-C., Tsao, S.-L., Zeng, Q.-A., Park, S.H., Ko, Y.-B., Hung, S.-H., Park, J.-H. (eds.) EUC-WS 2007. LNCS, vol. 4809, pp. 781–794. Springer, Heidelberg (2007)
Ning, H., Liu, H., Mao, J., et al.: Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems. IET Communications 5(12), 1755–1768 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bai, Y., Liu, Y. (2012). A Synchronization Strengthen RFID Authentication Protocol Based on Key Array. In: Lei, J., Wang, F.L., Deng, H., Miao, D. (eds) Artificial Intelligence and Computational Intelligence. AICI 2012. Lecture Notes in Computer Science(), vol 7530. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33478-8_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-33478-8_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33477-1
Online ISBN: 978-3-642-33478-8
eBook Packages: Computer ScienceComputer Science (R0)