Abstract
For the RFID authentication protocols based on Hash functions, there are some shortcomings, such as imperfect defense on the attacks, intensive calculation, time-consuming authentication process, and so on. By using of the dynamic-shared key and one-way feature of Hash function, a lightweight Hash-based mutual authentication protocol has been proposed and proved by SVO logic in this paper. It avoids an exhaustive search in the back-end database, and supports the transfer of ownership of the tag and the scalability of RFID system. Besides resisting the common attacks, the protocol is suitable for the RFID system that needs to be low-cost, lightweight computing and large numbers of tags, which is of significant merit for RFID application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zheng, Z., Mo, H.: Research and implication of RFID security authentication protocol. Master dissertation, Beijing Jiaotong University, Beijing, April 2014
Sun, X., Zhao, Z.: A Hash-based mutual authentication protocol for the RFID system. J. Hangzhou Dianzi Univ. 32(6), 29–32 (2012)
Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Kaliski, B.S., Koç, ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003). doi:10.1007/3-540-36400-5_33
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004). doi:10.1007/978-3-540-39881-3_18
Ohkubo, D., Suzuki, K., Kinoshita, S.: Hash-chain based forward-secure privacy protection scheme for low-cost RFID. In: Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004), Sendai, pp. 719–724 (2004)
Henrici, D.,Muller, P.: Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 149–153. IEEE (2004)
Rhee, K., Kwak, J., Kim, S., Won, D.: Challenge-response based RFID authentication protocol for distributed database environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70–84. Springer, Heidelberg (2005). doi:10.1007/978-3-540-32004-3_9
Molnar, D., Wagner, D.: Privacy and security in library RFID: issues, practices, and architectures. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington, DC, pp. 210–219 (2004)
Tsudik, G.: YA-TRAP: yet another trivial RFID authentication protocol. In: Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops. PerCom Workshops 2006, pp. 640–643. IEEE (2006)
Li, Z., Lu, G., Xin, Y.W.: A extensible authentication protocol based on Hash chain. Comput. Eng. 34(4), 173–175 (2008)
Xiong, W., Xue, K., Hong, P., et al.: A RFID security protocol based on Hash chain in two-dimensional interval. J. China Univ. Sci. Technol. 41(007), 594–598 (2011)
Yuan, S.-G., Dai, H.-Y., Lai, S.-L.: Hash-based RFID authentication protocol. Comput. Eng. 34(12), 141–143 (2008)
Chen, S., Chen, R., Ling, L.: An improved Hash-function security protocol for RFID bidirectional authentication. Comput. Syst. Appl. 19(3), 67–70 (2010)
Zhou, Y.: Research on RFID mutual authentication protocol based on Hash chain. Master dissertation, South West Jiaotong University (2012)
Liu, P., Zhang, C., Ou, Q.Y.: A Hash-based f mutual authentication security protocol for the mobile RFID. Design. Comput. Appl. 33(5), 1350–1352 (2013)
Ding, Z., Li, J., Feng, B.: Research on Hash-based RFID security authentication protocol. J. Comput. Res. Dev. 46(4), 583–592 (2009)
Si, C., Wen, G.: A design and implementation of RFID security authentication protocol based on Hash function. Master dissertation, University of Electronic Science and technology, Chengdu, December 2013
Song, B., Mitchell, C.J.: Scalable RFID security protocols supporting tag ownership transfer. Comput. Commun. 34(4), 556–566 (2011)
Huang, Y.J., Yuan, C.C., Chen, M.K., et al.: Hardware implementation of RFID mutual authentication protocol. IEEE Trans. Ind. Electron. 57(5), 1573–1582 (2010)
Kardas, S., Akgu, M., Kiraz, M.S., et al.: Cryptanalysis of lightweight mutual-authentication and ownership transfer for RFID systems. In: 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols and Applications, pp. 20–25 (2011)
Syverson, P.F., van Oorschot, P.C.: On unifying some cryptographic protocol. In: Proceedings of the IEEE 1994 Computer Society Symposium on Security & Privacy. IEEE Computer Society, USA, pp. 14–28 (1994)
Syverson, P.F., van Oorschot P.C.: A unified cryptographic protocol logic. Technical report, NRL Publication 5540-227
Acknowledgments
This research is supported by Natural Science Foundation of China (NSFC), under grant number 61370227, and by Union NSF of Hunan Province & Xiangtan City of China, under grant number: 2015JJ5034.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Li, Z., Zhong, X., Chen, X., Liu, J. (2017). A Lightweight Hash-Based Mutual Authentication Protocol for RFID. In: Cao, J., Liu, J. (eds) Management of Information, Process and Cooperation. MIPaC 2016. Communications in Computer and Information Science, vol 686. Springer, Singapore. https://doi.org/10.1007/978-981-10-3996-6_7
Download citation
DOI: https://doi.org/10.1007/978-981-10-3996-6_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3995-9
Online ISBN: 978-981-10-3996-6
eBook Packages: Computer ScienceComputer Science (R0)