Computer Science ›› 2016, Vol. 43 ›› Issue (8): 128-130.doi: 10.11896/j.issn.1002-137X.2016.08.027

Previous Articles     Next Articles

Improved RFID Authentication Protocol with Backward Privacy

LIU Dao-wei, LING Jie and YANG Xin   

  • Online:2018-12-01 Published:2018-12-01

Abstract: In the application of Internet of things,aiming at the security flaws of existing RFID security authentication protocol and low authentication efficiency,this paper proposed a meet to RFID privacy after two-way authentication protocol,which uses Rabin operation of one-way encryption algorithm to solve the problem of synchronization and later to the privacy,and uses random number to keep the label information of freshness.BAN logic method is used to the formal agreement.Compared the security and cost of the proposed protocol with the existing security authentication protocols,the results show that this protocol not only has the anti tracking,anti brute force crack,and anti replay attack etc,but also because of the reduction of the gate circuit,reduces the cost of protocol,and is suitable for low-cost RFID system.

Key words: Internet of things,Rabin algorithm,RFID,BAN formal analysis

[1] Ding Zhen-hua,Li Jin-tao,Feng Bo.Research on hash-basedRFID security authentication protocol [J].Journal of computer Research and Development,2009,46(4):583-592(in Chinese) 丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,6(4):583-592
[2] Ma Chang-she.Low cost RFID authentication protocol with forward privacy [J].Chinese Journal of Comptuers,2011,34(8):1388-1398(in Chinese) 马昌社.前向隐私安全的低成本RFID认证协议[J].计算机学报,2011,4(8):1388-1398
[3] International Telecommunication Union.ITU Internet Reports 2005:The Internet of Things [R].Geneva:ITU,2005
[4] Zhou Yong-bin,Feng Deng-guo.Design and analysis of cryptographic protocols RFID[J].Chinese Journal of Computers,2006,29(4):581-590(in Chinese) 周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,9(4):581-589
[5] Jin Yong-ming,Wu Qi-ying,Shi Zhi-qiang,et al.RFID Lightweight Authentication Protocol Based on PRF [J].Journal of Computer Research and Development,2014,1(7):1506-1514(in Chinese) 金永明,吴棋滢,石志强等.基于PRF的RFID轻量级认证协议研究[J].计算机研究与发展,2014,1(7):1506-1514
[6] Ohkubo M,Suzuki K,Kinoshta S.Hash-chain based for-ward-secure privacy protection scheme for low-cost RFID[C]∥Proceedings of the 2004 Symposium on Cryptography and Information Security.Berlin:Springer-Verlag,2004:719-724
[7] Miyaji A,Rahman M S.KIMAP:Key-insulated mutual authentication protocol for RFID [J].Int Journal of Automated Identification Technology,2011,3(2):61-74
[8] Alomair B,Cuellar J,Poovendran R.Scalable RFID systems:A privacy-preserving protocol with constant time identification [J].IEEE Trans on Parallel and Distributed Systems,2012,3(8):1-10
[9] Godor G,Imre S.Hash-based mutual authentication protocol for low-cost RFID systems[C]∥Proc of the 18thEUNICE Conf on Information and Communications Technologies.Berlin:Sprin-ger,2012:76-87
[10] Mamun M S I,Miyaji A,Rahman M S.A secure and private RFID authentication protocol under SLPN problem[C]∥Proc of the 6thInt Conf on Network and System Security.Berlin:Sprin-ger,2012:476-489
[11] Wang Shao-hui,Liu Su-juan,Chen Dan-wei.Scalable RFID Mutual Authentication Protocol with Backward Privacy [J].Journal of computer Research and Development,2013,0(6):1276-1284(in Chinese) 王少辉,刘素娟,陈丹伟.满足后向隐私的可扩展RFID双向认证方案[J].计算机研究与发展,2013,0(6):1276-1284
[12] Shamir A.SQUASH-A new MAC with provable security pro-perties for highly constrained devices such as RFID tags [C]∥Proc of Fast Software Encryption.Berlin:Springer,2008:144-157
[13] Gosset F,Standaert F X,Quisquater J J.FPGA implementation of SQUASH[C]∥Proc of the 29th Sysp on Information Theory in the Benelux.Leuven:Werkgemeenschap Informatie,2008:1-8

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!