Efficient mutual authentication protocol for radiofrequency identification systems

The radio frequency identification (RFID) technology is expected to play a vital role in identifying objects and serving to prevent counterfeiting and fraud. The use of RFID tags may cause privacy violation of users carrying an RFID tag. Owing to the unique identification number of the RFID tag, the possible privacy threats are information leakage of a tag, traceability of the consumer, denial of service attack and impersonation of a tag. Owing to the large number of tags in any application individual secret value for each tag requires a large number of complex hash computations in the database side. To reduce the computation overhead many protocols use a group secret value for tags in the database side. This study proposes a new authentication protocol which provides privacy and security in a more efficient manner using individual secret values for each tag and also avoids many complex hash operations in the database side. The evaluation indicates that the proposed protocol requires a low storage, computation and communication cost but offers larger ranges of privacy and security protection.

[1]  Matthew J. B. Robshaw,et al.  An Active Attack Against HB +-A Provably Secure Lightweight Authentication Protocol , 2022 .

[2]  Dong Hoon Lee,et al.  Efficient RFID Authentication Protocol for Ubiquitous Computing Environment , 2005, EUC Workshops.

[3]  Simson L. Garfinkel,et al.  RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.

[4]  Roy Want,et al.  An introduction to RFID technology , 2006, IEEE Pervasive Computing.

[5]  Jorge Munilla,et al.  HB-MP: A further step in the HB-family of lightweight authentication protocols , 2007, Comput. Networks.

[6]  Dongho Won,et al.  Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment , 2005, SPC.

[7]  Paul Müller,et al.  Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[8]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[9]  Dong Hoon Lee,et al.  Efficient Authentication for Low-Cost RFID Systems , 2005, ICCSA.

[10]  Hung-Yu Chien,et al.  Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.

[11]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[12]  Manuel Blum,et al.  Secure Human Identification Protocols , 2001, ASIACRYPT.