PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
RFID Authentication Protocol Using ID Synchronization in Insecure Communication
ICHIT '06 Proceedings of the 2006 International Conference on Hybrid Information Technology - Volume 02
ICHIT '06 Proceedings of the 2006 International Conference on Hybrid Information Technology - Volume 02
Security of RFID Protocols -- A Case Study
Electronic Notes in Theoretical Computer Science (ENTCS)
An efficient mutual authentication scheme for EPCglobal class-1 generation-2 RFID system
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
New privacy results on synchronized RFID authentication protocols against tag tracing
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Hi-index | 0.00 |
As industries aggressively deploy Radio Frequency IDentification application systems, the user privacy invasion and system security threats are increasingly concernd by individuals and organizations. Recently several hash-based mutual authentication schemes have been proposed to resolve security-related problems. However, previous schemes either suffer from security loopholes or have system efficiency problem for identity match process. In this paper, the security flaws of two recently proposed hash-based authentication schemes are analyzed at first. Based on this analysis, we identify the security and privacy criterions for the authentication process of RFID systems, and propose a new mutual authentication scheme to eliminate possible security flaws and enhance privacy protection to the owner of an object with RFID tag attached on it. In addition, we develop an efficient identity match and retrieval mechanism to relieve the heavy computation load of traditional match scheme between received tag identity and records in backend database of RFID systems.