首页 | 本学科首页   官方微博 | 高级检索  
     


A novel mutual authentication scheme based on quadratic residues for RFID systems
Affiliation:1. NYU Multimedia and Visual Computing Lab, USA;2. Department of Electrical and Computer Engineering, NYU Abu Dhabi, United Arab Emirates;3. Department of Computer Science and Engineering, NYU Tandon School of Engineering, USA;4. Department of Electrical and Computer Engineering, NYU Tandon School of Engineering, USA;1. Key Laboratory of Mesoscopic Chemistry of MOE, Jiangsu Key Laboratory of Advanced Organic Materials, School of Chemistry and Chemical Engineering, Nanjing University, Nanjing 210023, China;2. School of Petrochemical Engineering, Changzhou University, Changzhou 213164, China
Abstract:In 2004, Ari Juels proposed a Yoking-Proofs protocol for RFID systems. Their aim is to permit a pair of tags to generate a proof which is verifiable off-line by a trusted entity even when the readers are potentially untrusted. However, we found that their protocol does not possess the anonymity property but also suffers from both known-plaintext attack and replay attack. Wong et al. Kirk H.M. Wong, Patrick C.L. Hui, Allan C.K. Chan, Cryptography and authentication on RFID passive tags for apparel products, Computer in Industry 57 (2005) 342–349] proposed an authentication scheme for RFID passive tags, attempting to be a standard for apparel products. Yet, to our review, their protocol suffers from guessing parameter attack and replay attack. Moreover, both of the schemes have the common weakness: the backend server must use brute search for each tag’s authentication. In this paper, we first describe the weaknesses in the two above-mentioned protocols. Then, we propose a novel efficient scheme which not only achieve the mutual authentication between the server and the tag but also can satisfy all the security requirements needed in an RFID system.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号