Advertisement

A Two-Way Identity Authentication Scheme Based on Dynamic Password

  • Baohua Zhao
  • Ningyu An
  • Xiao Liang
  • Chunhui Ren
  • Zhihao Wang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11344)

Abstract

In order to solve the security issues existed in RFID authentication in recent years. A mutual identity authentication scheme based on dynamic is proposed after describing and analyzing the problems that RFID authentication technology encounters, which can solve replay attack, man-in-the-middle attack and other security issues. In addition, this paper also describes the techno of Authentication technology. The method proposed refers to tags privacy level between Tag and Reader to achieve mutual authentication, it not only can enhance the privacy protection of the label carrier and protect the identity privacy of the Reader holder, but also has a certain effectiveness advantage.

Keywords

Mutual authentication Internet of Things Mobile RFID 

References

  1. 1.
    Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRefGoogle Scholar
  2. 2.
    Cbien, H., Chen, C.: Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Comput. Stan. Interfaces 29(2), 254–259 (2016)Google Scholar
  3. 3.
    Dimitriou, T.: A lightweight RFID protocol to protect against traceability and cloning attacks. In: International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 59–66. IEEE Press (2005)Google Scholar
  4. 4.
    Kang, S.Y., Lee, D.G., Lee, I.Y.: A study on secure RFID mutual authentication scheme in pervasive computing environment. Comput. Commun. 31(18), 4248–4254 (2008)CrossRefGoogle Scholar
  5. 5.
    Kaya, S.V., Sava, E.: Public key cryptography based privacy preserving multi-context RFID infrastructure. Ad Hoc Netw. 7(1), 136–152 (2009)CrossRefGoogle Scholar
  6. 6.
    Watro, R., Kong, D., Cuti, S.F., et al: TinyPK: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 59–64. ACM (2004)Google Scholar
  7. 7.
    Perrig, A., Szewczyk, R., Tygar, J.D., et al.: SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)CrossRefGoogle Scholar
  8. 8.
    Du, W., Wang, R., Ning, P.: An efficient scheme for authenticating public keys in sensor networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Urbana, pp. 58–67 (2005)Google Scholar
  9. 9.
    Ibriq, J., Mahgoub, I.: A hierarchical key establishment scheme for wireless sensor networks. In: Proceedings of 21st International Conference on Advanced Networking and Applications (AINA 2007), Niagara Falls, pp. 210–219 (2007)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Baohua Zhao
    • 1
    • 2
    • 3
  • Ningyu An
    • 2
    • 3
  • Xiao Liang
    • 2
    • 3
  • Chunhui Ren
    • 2
    • 3
  • Zhihao Wang
    • 2
    • 3
  1. 1.Faculty of Information TechnologyBeijing University of TechnologyBeijingChina
  2. 2.Global Energy Interconnection Research Institute Co., Ltd.BeijingChina
  3. 3.Artificial Intelligence on Electric Power System State Grid Corporation Joint Laboratory (GEIRI)BeijingChina

Personalised recommendations