An improved hash-based RFID two-way security authentication protocol and application in remote education

With the increasingly expanding application of RFID technology, the security and privacy issues of RFID system has also been a widespread concern. The existing RFID security protocol can’t simultaneously meet the requirements of low-cost, low computing, high efficiency and high security. In this paper, through the analysis of common principles and shortcomings of RFID security protocols based on Hash Function, we improve the security protocols, so as to achieve the objectives of two-way authentication. This paper theoretically proves the protocol security through BAN logic. And the new protocols can effectively solve the security and privacy problems such as replay attack, fake attack, location privacy, anonymous tags and so on. The paper proposes a kind of authentication and communication security mechanism that makes full use of the functions of the conditional Access Module (CAM) which exist in the original remote education system and when authenticating the nodes of the system, we use the proposed security scheme. Analysis showed that the mechanism is safe, reliable, strong compatibility, economic and applicable.

[1]  A. Maarof,et al.  Security analysis of low cost RFID systems , 2014, 2014 5th Workshop on Codes, Cryptography and Communication Systems (WCCCS).

[2]  Jinxing Hu,et al.  Managing Big City Information Based on WebVRGIS , 2016, IEEE Access.

[3]  Zhihan Lv,et al.  Bigdata Oriented Multimedia Mobile Health Applications , 2016, Journal of Medical Systems.

[4]  Xu Ying,et al.  Collaborative Multi-hop Routing in Cognitive Wireless Networks , 2015, Wireless Personal Communications.

[5]  Marcel Kyas,et al.  Security and privacy protocol for emerging smart RFID applications , 2014, 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).

[6]  Zhihan Lv,et al.  Game On, Science - How Video Game Technology May Help Biologists Tackle Visualization Challenges , 2013, PloS one.

[7]  M. Islam,et al.  Cubic spline-based tag estimation method in RFID multi-tags identification process , 2013, Canadian Journal of Electrical and Computer Engineering.

[8]  Zhao Xinsheng Research on RFID Security Authentication Protocol Based on Hash Function , 2011 .

[9]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[10]  Xu Zhiqiang,et al.  Secure and Private Protocols for Server-less RFID Systems , 2014 .

[11]  Jianxiong Zhou,et al.  A Real-Time Monitoring System of Industry Carbon Monoxide Based on Wireless Sensor Networks , 2015, Sensors.

[12]  Mohammad Tariqul Islam,et al.  Theoretical analysis of RFID security protocols , 2014, 2014 IEEE International Conference on Industrial Engineering and Engineering Management.

[13]  Sujuan Liu,et al.  Security Analysis and Improvement on Two RFID Authentication Protocols , 2015, Wirel. Pers. Commun..

[14]  Zhihan Lv,et al.  A Self-Assessment Stereo Capture Model Applicable to the Internet of Things , 2015, Sensors.

[15]  Shang Yu,et al.  An Efficient RFID Authentication Protocol Supporting Tag Ownership Transfer , 2012 .

[16]  Catherine A. Meadows Formal Analysis of Cryptographic Protocols , 2011, Encyclopedia of Cryptography and Security.

[17]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.