Abstract
Radio frequency identification (RFID) is an integral part of our life. This term is coined for short-range radio communication technology. It is used to send and receive the digital information between stationary location and non-stationary object or between movable objects. It automates the wireless technology using radio waves to identify an object. This technology has widespread applications in the field of security, access control, transportation, etc. In this paper, we analyze an existing RFID-based protocol and demonstrate that it is insecure against impersonation attack, man-in-middle attack, server-masquerading attack, insider attack, and denial-of-service. We also propose a novel protocol, namely Encrypted Tag Identity and Secret Value Protocol, to overcome the shortcomings and loopholes existing in the surveyed protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shepard, S.: RFID: Radio Frequency Identification. McGraw Hill Professional (2005)
Landt, J.: The history of RFID. IEEE Potentials 24(4), 8–11 (2005)
Srivastava, K., Awasthi, A.K., Kaul, S.D., Mittal, R.: A hash based mutual RFID tag authentication protocol in telecare medicine information system. J. Med. Syst. 39(1), 153 (2015)
Ohkubo, M., Suzuki, K., Kinoshita, S., et al.: Cryptographic approach to privacy-friendly tags. In: RFID Privacy Workshop, Cambridge, USA, vol. 82 (2003)
Center, A.-I.: 860Â MHz-960Â MHz Class-I radio frequency identification tag radio frequency & logical communication interface specification proposed recommendation version 1.0. 0 (2002)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Security in Pervasive Computing, pp. 201–212. Springer (2004)
Tsudik, G.: YA-TRAP: yet another trivial RFID authentication protocol. In: Pervasive Computing and Communications Workshops, 2006. PerCom Workshops 2006. Fourth Annual IEEE International Conference on, IEEE, pp. 4–7 (2006)
Tsudik, G.: A family of dunces: trivial RFID identification and authentication protocols. In: Privacy Enhancing Technologies, pp. 45–61. Springer (2007)
Chatmon, C., van Le, T., Burmester, M.: Secure anonymous RFID authentication protocols. Florida State University, Department of Computer Science, Tech. Rep
Sun, P.R., Wang, B.H., Wu, F.: A new method to guard inpatient medication safety by the implementation of RFID. J. Med. Syst. 32(4), 327–332 (2008)
Huang, H.-H., Ku, C.-Y.: A RFID grouping proof protocol for medication safety of inpatient. J. Med. Syst. 33(6), 467 (2009)
Chien, H.-Y., Yang, C.-C., Wu, T.-C., Lee, C.-F.: Two RFID-based solutions to enhance inpatient medication safety. J. Med. Syst. 35(3), 369–375 (2011)
Peris-Lopez, P., Orfila, A., Mitrokotsa, A., Van der Lubbe, J.C.: A comprehensive RFID solution to enhance inpatient medication safety. Int. J. Med. Inform. 80(1), 13–24 (2011)
Yen, Y.-C., Lo, N.-W., Wu, T.-C.: Two RFID-based solutions for secure inpatient medication administration. J. Med. Syst. 36(5), 2769–2778 (2012)
Kim, H.: Enhanced hash-based RFID mutual authentication protocol. In: Computer Applications for Security, Control and System Engineering, pp. 70–77. Springer (2012)
Kim, H.: RFID mutual authentication protocol based on synchronized secret. Int. J. Secur. Appl. 7(4), 37–50 (2013)
Chen, Y.-Y., Huang, D.-C., Tsai, M.-L., Jan, J.-K.: A design of tamper resistant prescription RFID access control system. J. Med. Syst. 36(5), 2795–2801 (2012)
Cho, J.-S., Yeo, S.-S., Kim, S.K.: Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value. Comput. Commun. 34(3), 391–397 (2011)
Suja, S., Arivarasi, A.: An RFID Authentication Protocol for Security and Privacy. ​In: International Conference on Computing and Control Engineering (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Saxena, M., Shaw, R.N., Verma, J.K. (2019). A Novel Hash-Based Mutual RFID Tag Authentication Protocol. In: Jain, L., E. Balas, V., Johri, P. (eds) Data and Communication Networks. Advances in Intelligent Systems and Computing, vol 847. Springer, Singapore. https://doi.org/10.1007/978-981-13-2254-9_1
Download citation
DOI: https://doi.org/10.1007/978-981-13-2254-9_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2253-2
Online ISBN: 978-981-13-2254-9
eBook Packages: EngineeringEngineering (R0)