Advertisement

An Improvement RFID Security Authentication Protocol Based on Hash Function

  • Haowen Sun
  • Peng LiEmail author
  • He Xu
  • Feng Zhu
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 773)

Abstract

Radio frequency identification (RFID) technology faces many security issues, and a detailed analysis of these security issues is conducted. It analyzes the existing RFID security authentication protocol and proposes a security authentication protocol that can effectively solve the problems of fraud, retransmission, tracking, and synchronization. In the continuous conversation mode of RFID, it uses the powerful computing power of the reader, the random number identification and comparison between the reader and the tag can resist the denial of service attack. To be able to resist desynchronization attacks, the back-end database stores tag identifiers and dynamically updates the data so that the tags and the background database maintain data synchronization. It utilizes the reader’s computing and storage functions to reduce the cost of tags, makes the agreement meet the requirements of low-cost, ensures two-way authentication, and improves the efficiency of the security authentication protocol.

Notes

Acknowledgments

The subject is sponsored by the National Natural Science Foundation of P. R. China (No. 61672296, No. 61602261), the Natural Science Foundation of Jiangsu Province (No. BK20160089), Scientific & Technological Support Project of Jiangsu Province (No. BE2016777, BE2016185).

References

  1. 1.
    Want, R.: An introduction to RFID technology. IEEE Pervasive Comput. 5(1), 25–33 (2006)CrossRefGoogle Scholar
  2. 2.
    Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381–394 (2006)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Lakafosis, V., Traille, A., Lee, H., et al.: An RFID system with enhanced hardware-enabled authentication and anti-counterfeiting capabilities. In: Microwave Symposium Digest, pp. 840–843. IEEE (2010)Google Scholar
  4. 4.
    Bonuccelli, M.A., Martelli, F.: A very fast tags polling protocol for single and multiple readers RFID systems, and its applications. Ad Hoc Netw. 71, 14–30 (2018)CrossRefGoogle Scholar
  5. 5.
    Shen, Z., Zeng, P., Qian, Y., Choo, K.-K.R.: A secure and practical RFID ownership transfer protocol based on chebyshev polynomials. IEEE Access 6, 14560–14566 (2018)CrossRefGoogle Scholar
  6. 6.
    Rieback, M.R., Crispo, B., Tanenbaum, A.S.: The evolution of RFID security. IEEE Pervasive Comput. 5(1), 62–69 (2006)CrossRefGoogle Scholar
  7. 7.
    Schantin, A., Ruland, C.: Retransmission strategies for RFID systems using the EPC protocol. In: IEEE International Conference on RFID-Technologies and Applications, pp. 1–6. IEEE (2013)Google Scholar
  8. 8.
    Li, H., Hou, Y.B., Huang, Z.Q., et al.: Research on the attack model for RFID anti-counterfeit protocol. Acta Electronica Sinica 37(11), 2565–2573 (2009)Google Scholar
  9. 9.
    Kodialam, M., Nandagopal, T., Lau, W.C.: Anonymous tracking using RFID tags. In: IEEE International Conference on Computer Communications, INFOCOM 2007, pp. 1217–1225. IEEE (2007)Google Scholar
  10. 10.
    Zhou, S., Zhang, Z., Luo, Z., et al.: A lightweight anti-desynchronization RFID authentication protocol. Inf. Syst. Front. 12(5), 521–528 (2010)CrossRefGoogle Scholar
  11. 11.
    Fu, Y., Zhang, C., Wang, J.: A research on Denial of Service attack in passive RFID system. In: International Conference on Anti-Counterfeiting Security and Identification in Communication, pp. 24–28. IEEE (2010)Google Scholar
  12. 12.
    Xie, R., Jian, B., Liu, D.: An improved ownership transfer for RFID protocol. Int. J. Netw. Secur. 20(1), 149–156 (2018)Google Scholar
  13. 13.
    Zhang, Y., Yang, F., Wang, Q., He, Q., Li, J., Yang, Y.: An anti-collision algorithm for RFID-based robots based on dynamic grouping binary trees. Comput. Electr. Eng. 63, 91–98 (2017)CrossRefGoogle Scholar
  14. 14.
    Cai, Y., Zhang, J.: Comparison and research of RFID security authentication protocol. Digit. Commun. World. 12, 62–66 (2015)Google Scholar
  15. 15.
    Ding, Z., Li, J., Feng, B.: Research on hash-based RFID security authentication protocol. J. Comput. Res. Dev. 46(4), 583–592 (2009)Google Scholar
  16. 16.
    Zeng, L., Zhang, X., Zhang, T.: Key value renewal random hash lock for security and privacy enhancement of RFID. Comput. Eng. 33(3), 151–153 (2007)MathSciNetGoogle Scholar
  17. 17.
    Zhong, J.Z.: Design and research on RFID security protocol based on hash-chain. Modern Comput. 8, 139–141 (2010)Google Scholar
  18. 18.
    Zhang W.: Analysis and improvement of RFID security authentication protocol HSAP. Intell. Comput. Appl. 5, 78–80 (2012)Google Scholar
  19. 19.
    Benssalah, M., Djeddou, M., Drouiche, K.: Security analysis and enhancement of the most recent RFID authentication protocol for telecare medicine information system. Wirel. Pers. Commun. 96(4), 6221–6238 (2017)CrossRefGoogle Scholar
  20. 20.
    Wang, K.-H., Chen, C.-M., Fang, W., Tsu-Yang, W.: On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags. J. Supercomput. 74(1), 65–70 (2018)CrossRefGoogle Scholar
  21. 21.
    Gandino, F., Montrucchio, B., Rebaudengo, M.: A security protocol for RFID traceability. Int. J. Commun. Syst. 30(6), e3109 (2017)CrossRefGoogle Scholar
  22. 22.
    Sarker, J.H., Nahhas, A.M.: Mobile RFID system in the presence of denial-of-service attacking signals. IEEE Trans. Autom. Sci. Eng. 14(2), 955–967 (2017)CrossRefGoogle Scholar
  23. 23.
    Wang, C., Shi, Z., Fei, W.: An improved particle swarm optimization-based feed-forward neural network combined with RFID sensors to indoor localization. Information 8(1), 9 (2017)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of Computer ScienceNanjing University of Posts and TelecommunicationsNanjingChina
  2. 2.Jiangsu High Technology Research Key Laboratory for Wireless Sensor NetworksNanjingChina

Personalised recommendations