Skip to main content

A Novel Hash-Based Mutual RFID Tag Authentication Protocol

  • Conference paper
  • First Online:
Data and Communication Networks

Abstract

Radio frequency identification (RFID) is an integral part of our life. This term is coined for short-range radio communication technology. It is used to send and receive the digital information between stationary location and non-stationary object or between movable objects. It automates the wireless technology using radio waves to identify an object. This technology has widespread applications in the field of security, access control, transportation, etc. In this paper, we analyze an existing RFID-based protocol and demonstrate that it is insecure against impersonation attack, man-in-middle attack, server-masquerading attack, insider attack, and denial-of-service. We also propose a novel protocol, namely Encrypted Tag Identity and Secret Value Protocol, to overcome the shortcomings and loopholes existing in the surveyed protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shepard, S.: RFID: Radio Frequency Identification. McGraw Hill Professional (2005)

    Google Scholar 

  2. Landt, J.: The history of RFID. IEEE Potentials 24(4), 8–11 (2005)

    Article  Google Scholar 

  3. Srivastava, K., Awasthi, A.K., Kaul, S.D., Mittal, R.: A hash based mutual RFID tag authentication protocol in telecare medicine information system. J. Med. Syst. 39(1), 153 (2015)

    Article  Google Scholar 

  4. Ohkubo, M., Suzuki, K., Kinoshita, S., et al.: Cryptographic approach to privacy-friendly tags. In: RFID Privacy Workshop, Cambridge, USA, vol. 82 (2003)

    Google Scholar 

  5. Center, A.-I.: 860 MHz-960 MHz Class-I radio frequency identification tag radio frequency & logical communication interface specification proposed recommendation version 1.0. 0 (2002)

    Google Scholar 

  6. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Security in Pervasive Computing, pp. 201–212. Springer (2004)

    Google Scholar 

  7. Tsudik, G.: YA-TRAP: yet another trivial RFID authentication protocol. In: Pervasive Computing and Communications Workshops, 2006. PerCom Workshops 2006. Fourth Annual IEEE International Conference on, IEEE, pp. 4–7 (2006)

    Google Scholar 

  8. Tsudik, G.: A family of dunces: trivial RFID identification and authentication protocols. In: Privacy Enhancing Technologies, pp. 45–61. Springer (2007)

    Google Scholar 

  9. Chatmon, C., van Le, T., Burmester, M.: Secure anonymous RFID authentication protocols. Florida State University, Department of Computer Science, Tech. Rep

    Google Scholar 

  10. Sun, P.R., Wang, B.H., Wu, F.: A new method to guard inpatient medication safety by the implementation of RFID. J. Med. Syst. 32(4), 327–332 (2008)

    Article  Google Scholar 

  11. Huang, H.-H., Ku, C.-Y.: A RFID grouping proof protocol for medication safety of inpatient. J. Med. Syst. 33(6), 467 (2009)

    Article  Google Scholar 

  12. Chien, H.-Y., Yang, C.-C., Wu, T.-C., Lee, C.-F.: Two RFID-based solutions to enhance inpatient medication safety. J. Med. Syst. 35(3), 369–375 (2011)

    Article  Google Scholar 

  13. Peris-Lopez, P., Orfila, A., Mitrokotsa, A., Van der Lubbe, J.C.: A comprehensive RFID solution to enhance inpatient medication safety. Int. J. Med. Inform. 80(1), 13–24 (2011)

    Article  Google Scholar 

  14. Yen, Y.-C., Lo, N.-W., Wu, T.-C.: Two RFID-based solutions for secure inpatient medication administration. J. Med. Syst. 36(5), 2769–2778 (2012)

    Article  Google Scholar 

  15. Kim, H.: Enhanced hash-based RFID mutual authentication protocol. In: Computer Applications for Security, Control and System Engineering, pp. 70–77. Springer (2012)

    Google Scholar 

  16. Kim, H.: RFID mutual authentication protocol based on synchronized secret. Int. J. Secur. Appl. 7(4), 37–50 (2013)

    Google Scholar 

  17. Chen, Y.-Y., Huang, D.-C., Tsai, M.-L., Jan, J.-K.: A design of tamper resistant prescription RFID access control system. J. Med. Syst. 36(5), 2795–2801 (2012)

    Article  Google Scholar 

  18. Cho, J.-S., Yeo, S.-S., Kim, S.K.: Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value. Comput. Commun. 34(3), 391–397 (2011)

    Article  Google Scholar 

  19. Suja, S., Arivarasi, A.: An RFID Authentication Protocol for Security and Privacy. ​In: International Conference on Computing and Control Engineering (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jitendra Kumar Verma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Saxena, M., Shaw, R.N., Verma, J.K. (2019). A Novel Hash-Based Mutual RFID Tag Authentication Protocol. In: Jain, L., E. Balas, V., Johri, P. (eds) Data and Communication Networks. Advances in Intelligent Systems and Computing, vol 847. Springer, Singapore. https://doi.org/10.1007/978-981-13-2254-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2254-9_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2253-2

  • Online ISBN: 978-981-13-2254-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics