Secure Human Identification Protocols
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks
SECPERU '06 Proceedings of the Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing
IEEE Transactions on Dependable and Secure Computing
ERAP: ECC Based RFID Authentication Protocol
FTDCS '08 Proceedings of the 2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems
A Gen2-Based RFID Authentication Protocol for Security and Privacy
IEEE Transactions on Mobile Computing
Enhancing RFID Tag Resistance against Cloning Attack
NSS '09 Proceedings of the 2009 Third International Conference on Network and System Security
Securing RFID systems conforming to EPC Class 1 Generation 2 standard
Expert Systems with Applications: An International Journal
Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use. Volume 1
Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use. Volume 1
Parallel and concurrent security of the HB and HB+ protocols
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Optimization between AES security and performance for IEEE 802.15.3 WPAN
IEEE Transactions on Wireless Communications
Concurrency and Computation: Practice & Experience
Hi-index | 0.00 |
The open radio frequency identification (RFID) air interface may suffer from severe threats that make security problem become a critical issue for RFID systems and applications. This paper proposes a dual cryptography authentication protocol (DCAP) for RFID systems. DCAP partitions randomly the tag identifier into two partial identifiers that are used in the forward link and in the backward link, respectively. The protocol applies hash function and shared-key encryption algorithm to safeguard both forward and backward links and provides a three-round authentication mode on each tag and reader in a session. Then, authentication is carried out by the primary, secondary, and final verifications. For a formal analysis, a graphical method Colored Petri Nets is applied to model and analyze the correctness of DCAP. We prove that the protocol owns tag anonymity and forward security and has the capability to resist major attacks such as replay, reader forgery, and tag forgery. Finally, the performance in terms of storage, communication overhead, and computation load is evaluated to demonstrate that the protocol has modest complexity and high efficiency. Copyright © 2011 John Wiley & Sons, Ltd.