Review on RFID Identity Authentication Protocols Based on Hash Function

Publications

Share / Export Citation / Email / Print / Text size:

International Journal of Advanced Network, Monitoring and Controls

Xi'an Technological University

Subject: Computer Science, Software Engineering

GET ALERTS

eISSN: 2470-8038

DESCRIPTION

4
Reader(s)
14
Visit(s)
0
Comment(s)
0
Share(s)

SEARCH WITHIN CONTENT

FIND ARTICLE

Volume / Issue / page

Related articles

VOLUME 2 , ISSUE 1 (March 2017) > List of articles

Review on RFID Identity Authentication Protocols Based on Hash Function

Yang Bing / Liu Baolong / Chen Hua

Keywords : RFID, protocol, Hash, authentication, attack

Citation Information : International Journal of Advanced Network, Monitoring and Controls. Volume 2, Issue 1, Pages 72-82, DOI: https://doi.org/10.1109/iccnea.2017.20

License : (CC BY-NC-ND 4.0)

Published Online: 07-April-2018

ARTICLE

ABSTRACT

Radio frequency identification (RFID) is one of the key technologies of Internet of Things, which have many security issues in an open environment. In order to solve the communication problem between RFID tags and readers, security protocols has been improved constantly as the first choice. But the form of attack is also changing constantly with the development of technology. In this paper we classify the security protocols and introduce some problems in the recent security protocols.

Content not available PDF Share

FIGURES & TABLES

REFERENCES

Ohkubo M, Suzuki K, Kinoshta S, “Hash-chain based for-ward-secure privacy protection scheme for low-cost RFID” Proceedings of the 2004 Symposium on Cryptogra-phy and Information Security. Berlin: Springer-Verlag,2004,pp.719-724

 

Sarma S, Weis S, Engels D, “RFID systems and security and privacy implications,” Proc of the 4th Int Work-shop on Cryptographic Hardware and Embedded SystemsBerlin: Springer2002,pp. 454- 469

 

Weis S A, Sarma S E, Rivest R L, “et al.Security and privacy aspects of low-cost radio frequency identification systems,” Proc of the 1st Security in Pervasive Com-putting.Berlin: Springer 2003,pp.201-212

 

Taoyuan, Zhou Xideng, “Mobile mutual authentication protocol based on hash function,”Journal of Computer Applications, 2016, 36 (3),pp.657 – 660.

 

Hou Jinhuan, Ding Fuqiang, “New things RFID security protocol analysis and design of,”electronic technology and software engineering, 2015.

 

Zhao Ting, Wang Jian, “Dynamic RFID authentication protocol,” 2010 Hash function of the National Communications Security Conference on.

 

Guo Wei, “Improvement of HASH Chain Protocol in RFID,” second national information security protection technology conference proceedings, 2013, 6, 21.

 

C. Tan, B. Sheng, and Q. Li, “Secure and serverless rfid authentication and search protocols,” vol.7, no. 4, april 2008, pp. 1400 –1407.

 

Minghui Wang, Yongzheng Tang, Fang Shi, Junhua Pan, “An effective RFID authentication protocol,” 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), pp.141 – 144.

 

Tan C., Sheng B., and Li Q., “Severless search and authentication protocols for RFID ,”In Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications(PerCom ‘07), New York, USA. pp. 3-12 .

 

Ahamed, S. I., Rahman, F., and Hoque, M., Kawsar, Eand Nakajima,T, “YA-SRAP: Yet another serverless RFID authentication protocol,” In Proceedings of the 4th IET International Conference on Intelligent Environment (IE08). Seattle, USA. pp. 1-8,2008.

 

Feng Zebo, Wu Xiaoping, Liu Haohan, “RFID security authentication protocol a new free end database,” Journal of Naval University of engineering, 2015,02,pp.32-36.

 

Selwyn Piramuthu, “RFID mutual authentication protocols,” Decision Support Systems, Vol.50,

Issue 2, January 2011, pp.387-393.

 

Su Mi Lee, Young Ju Hwang, Dong Hoon Lee, Jong In Lim, “Efficient Authentication for Low- Cost RFID Systems,” Lecture Notes in Computer Science. Berlin, vol.3480, pp. 619-627,2005.

 

Yong Ki Lee, Ingrid Verbauwhede, “Secure and Low-cost RFID Authentication Protocols,” Proceedings of the 2nd IEEE Workshop on Adaptive Wireless Networks, 2005.

 

Kaleb Lee, “A Two-Step Mutual Authentication Protocol Based on Randomized Hash- Lock for Small RFID Networks,” 2010 Fourth International Conference on Network and System Security, pp. 527 – 533.

 

Eun Young ChoiSu Mi LeeDong Hong Lee, “Efficient RFID Authentication Protocol for Ubiquitous Computing Environment,” Embedded and Ubiquitous Computing, vo1.3832, pp.945- 954, 2005.

 

He Lei, Lu Xin-mei, Jin Song-he, Cai Zeng-yu, “A One-way Hash based Low-cost Authentication Protocol with Forward Security in RFID System,” 2010 2nd International Asia Conference on Informatics in Control, Automation and Robotics (CAR 2010)[2],pp.269 – 272.

 

J. H. Ha, S. J. Moon, J. Y. Zhou, and J. C. Ha, “A new formal proof model for RFID location privacy,” in: S. Jajodia and J. Lopez, editors, Proceedings of 13th European Symposium on Research in Computer Security–ESORICS’08, LNCS 5283, Springer–Verlag, pp. 267–281,2008.

 

Da-Zhi Sun, Ji-Dong Zhong, “A hash-based RFID security protocol for strong privacy protection,” IEEE Transactions on Consumer Electronics2012Vol.58, Issue: 4, pp.1246 – 1252.

 

Liang Huan qi, “Research of Mutual Authentication Protocol for RFID Based on Hash Function and Public Key,” South China University of Technology, 2012.

 

Jianliang Meng, Ze Wang, “A RFID Security Protocol Based on Hash Chain and Three-Way Handshake,” 2013 International Conference on Computational and Information Sciences,pp.1463 – 1466.

 

Yanfei Liu, Sha Feng, “Scalable Lightweight Authentication Protocol with Privacy Preservation,” 2014 Tenth International Conference on Computational Intelligence and Security, pp.474 – 478.

 

T. Li, W. Luo, Z. Mo, and S. Chen, “Privacy-preserving RFID authentication based on cryptographical encoding,” IEEE INFOCOM,2012, pp. 2174-2182.

 

G. Avoine, L. Buttyan, T. Holczer, and I. Vajda, “Group-Based Private Authentication,” IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks, 2007, pp. 1-6.

 

Prosanta Gope and Tzonelih Hwang, “A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system,” Computers & Security, Vol.55, November 2015, pp.271-280.

 

Prajnamaya Dass, Hari Om, “A secure authentication scheme for RFID Systems,” Procedia Computer Science, Vol.78, 2016, pp. 100-106.

 

Jung-Sik Cho, Young-Sik Jeong and Sang Oh Park, “Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol,” Computers & Mathematics with Applications, Vol.69, Issue 1, January 2015, pp. 58-65. [29] Dang Nguyen Duc and Kwangjo Kim, “Defending. RFID authentication protocols against DoS attacks,” Computer Communications, Vol.34, Issue 3, 15 March 2011, pp. 384-390.

 

EXTRA FILES

COMMENTS