首页 | 本学科首页   官方微博 | 高级检索  
     


An efficient and secure authentication protocol for RFID systems
Authors:Md Monzur Morshed  Anthony Atkins  Hong-Nian Yu
Affiliation:1. Faculty of Computing, Engineering and Technology, Staffordshire University, Stafford, ST18 ODF, UK
Abstract:The use of radio frequency identification (RFID) tags may cause privacy violation of users carrying an RFID tag. Due to the unique identification number of the RFID tag, the possible privacy threats are information leakage of a tag, traceability of the consumer, denial of service attack, replay attack and impersonation of a tag, etc. There are a number of challenges in providing privacy and security in the RFID tag due to the limited computation, storage and communication ability of low-cost RFID tags. Many research works have already been conducted using hash functions and pseudorandom numbers. As the same random number can recur many times, the adversary can use the response derived from the same random number for replay attack and it can cause a break in location privacy. This paper proposes an RFID authentication protocol using a static identifier, a monotonically increasing timestamp, a tag side random number and a hash function to protect the RFID system from adversary attacks. The proposed protocol also indicates that it requires less storage and computation than previous existing RFID authentication protocols but offers a larger range of security protection. A simulation is also conducted to verify some of the privacy and security properties of the proposed protocol.
Keywords:Radio frequency identification (RFID)  security  privacy  timestamp  authentication protocol
本文献已被 CNKI SpringerLink 等数据库收录!
点击此处可从《国际自动化与计算杂志》浏览原始摘要信息
点击此处可从《国际自动化与计算杂志》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号