Skip to main content

A Lightweight Hash-Based Mutual Authentication Protocol for RFID

  • Conference paper
  • First Online:
Management of Information, Process and Cooperation (MIPaC 2016)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 686))

  • 441 Accesses

Abstract

For the RFID authentication protocols based on Hash functions, there are some shortcomings, such as imperfect defense on the attacks, intensive calculation, time-consuming authentication process, and so on. By using of the dynamic-shared key and one-way feature of Hash function, a lightweight Hash-based mutual authentication protocol has been proposed and proved by SVO logic in this paper. It avoids an exhaustive search in the back-end database, and supports the transfer of ownership of the tag and the scalability of RFID system. Besides resisting the common attacks, the protocol is suitable for the RFID system that needs to be low-cost, lightweight computing and large numbers of tags, which is of significant merit for RFID application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zheng, Z., Mo, H.: Research and implication of RFID security authentication protocol. Master dissertation, Beijing Jiaotong University, Beijing, April 2014

    Google Scholar 

  2. Sun, X., Zhao, Z.: A Hash-based mutual authentication protocol for the RFID system. J. Hangzhou Dianzi Univ. 32(6), 29–32 (2012)

    Google Scholar 

  3. Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Kaliski, B.S., Koç, ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003). doi:10.1007/3-540-36400-5_33

    Chapter  Google Scholar 

  4. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004). doi:10.1007/978-3-540-39881-3_18

    Chapter  Google Scholar 

  5. Ohkubo, D., Suzuki, K., Kinoshita, S.: Hash-chain based forward-secure privacy protection scheme for low-cost RFID. In: Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004), Sendai, pp. 719–724 (2004)

    Google Scholar 

  6. Henrici, D.,Muller, P.: Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 149–153. IEEE (2004)

    Google Scholar 

  7. Rhee, K., Kwak, J., Kim, S., Won, D.: Challenge-response based RFID authentication protocol for distributed database environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70–84. Springer, Heidelberg (2005). doi:10.1007/978-3-540-32004-3_9

    Chapter  Google Scholar 

  8. Molnar, D., Wagner, D.: Privacy and security in library RFID: issues, practices, and architectures. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington, DC, pp. 210–219 (2004)

    Google Scholar 

  9. Tsudik, G.: YA-TRAP: yet another trivial RFID authentication protocol. In: Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops. PerCom Workshops 2006, pp. 640–643. IEEE (2006)

    Google Scholar 

  10. Li, Z., Lu, G., Xin, Y.W.: A extensible authentication protocol based on Hash chain. Comput. Eng. 34(4), 173–175 (2008)

    Google Scholar 

  11. Xiong, W., Xue, K., Hong, P., et al.: A RFID security protocol based on Hash chain in two-dimensional interval. J. China Univ. Sci. Technol. 41(007), 594–598 (2011)

    Google Scholar 

  12. Yuan, S.-G., Dai, H.-Y., Lai, S.-L.: Hash-based RFID authentication protocol. Comput. Eng. 34(12), 141–143 (2008)

    Google Scholar 

  13. Chen, S., Chen, R., Ling, L.: An improved Hash-function security protocol for RFID bidirectional authentication. Comput. Syst. Appl. 19(3), 67–70 (2010)

    Google Scholar 

  14. Zhou, Y.: Research on RFID mutual authentication protocol based on Hash chain. Master dissertation, South West Jiaotong University (2012)

    Google Scholar 

  15. Liu, P., Zhang, C., Ou, Q.Y.: A Hash-based f mutual authentication security protocol for the mobile RFID. Design. Comput. Appl. 33(5), 1350–1352 (2013)

    Google Scholar 

  16. Ding, Z., Li, J., Feng, B.: Research on Hash-based RFID security authentication protocol. J. Comput. Res. Dev. 46(4), 583–592 (2009)

    Google Scholar 

  17. Si, C., Wen, G.: A design and implementation of RFID security authentication protocol based on Hash function. Master dissertation, University of Electronic Science and technology, Chengdu, December 2013

    Google Scholar 

  18. Song, B., Mitchell, C.J.: Scalable RFID security protocols supporting tag ownership transfer. Comput. Commun. 34(4), 556–566 (2011)

    Article  Google Scholar 

  19. Huang, Y.J., Yuan, C.C., Chen, M.K., et al.: Hardware implementation of RFID mutual authentication protocol. IEEE Trans. Ind. Electron. 57(5), 1573–1582 (2010)

    Article  Google Scholar 

  20. Kardas, S., Akgu, M., Kiraz, M.S., et al.: Cryptanalysis of lightweight mutual-authentication and ownership transfer for RFID systems. In: 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols and Applications, pp. 20–25 (2011)

    Google Scholar 

  21. Syverson, P.F., van Oorschot, P.C.: On unifying some cryptographic protocol. In: Proceedings of the IEEE 1994 Computer Society Symposium on Security & Privacy. IEEE Computer Society, USA, pp. 14–28 (1994)

    Google Scholar 

  22. Syverson, P.F., van Oorschot P.C.: A unified cryptographic protocol logic. Technical report, NRL Publication 5540-227

    Google Scholar 

Download references

Acknowledgments

This research is supported by Natural Science Foundation of China (NSFC), under grant number 61370227, and by Union NSF of Hunan Province & Xiangtan City of China, under grant number: 2015JJ5034.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhangbing Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Li, Z., Zhong, X., Chen, X., Liu, J. (2017). A Lightweight Hash-Based Mutual Authentication Protocol for RFID. In: Cao, J., Liu, J. (eds) Management of Information, Process and Cooperation. MIPaC 2016. Communications in Computer and Information Science, vol 686. Springer, Singapore. https://doi.org/10.1007/978-981-10-3996-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3996-6_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3995-9

  • Online ISBN: 978-981-10-3996-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics