scholarly journals F-HB+: A Scalable Authentication Protocol for Low-Cost RFID Systems

Author(s):  
Maire ONeill ◽  
Xiaolin Cao
2011 ◽  
Vol 467-469 ◽  
pp. 1787-1792
Author(s):  
Yung Cheng Lee

Due to the well-developed technology and its variety of applications, the Radio Frequency Identifications (RFIDs) are widespread in a broad range of markets. In many applications, the RFID systems need security service such as authentication mechanism to identify tag and resist possible attacks. In 2008, Song et al. proposed a RFID authentication protocol for low-cost tags. Their protocol has the merits of privacy and security properties, and it can stand tag impersonation attack, replay attack, and backward/forward traceability. In this article, we show that their protocol cannot resist server impersonation attack as they declared. An adversary can successfully impersonate as a server to send fake message for verification. We also present countermeasures to fix the flaw. The performance of the improved mechanisms is the same as that of Song et al.’s protocol while the server impersonation attack is avoided.


2014 ◽  
Vol 8 (6) ◽  
pp. 225-234 ◽  
Author(s):  
Zhicai Shi ◽  
Josef Pieprzyk ◽  
Christophe Doche ◽  
Yongxiang Xia ◽  
Yu Zhang ◽  
...  

2014 ◽  
Vol 543-547 ◽  
pp. 2255-2261
Author(s):  
Bing Zhang ◽  
Zhi Guang Qin ◽  
Guo Gen Wan ◽  
Xin Xin Ma

This document analyzes the security drawback of the Hash-based algorithm authentication protocols which is frequently used in low-cost RFID systems, and proposes a lightweight mutual authentication protocol. In the proposed protocol, all authenticated information is encrypted , the location privacy is also provided by refreshing an identifier of a tag in each session and lost massages can be recovered from many attacks such as spoofing attacks. The comparison result of the simulation experiment and the formal correctness proof of the proposed authentication protocol is based on BAN logic. It shows that the proposed protocol in this article greatly enhance the capability of verifiability, confidentiality and integrality, it also corrects the existing Hash-based protocol secure deficiency so that it is more suitable for low-cost RFID systems than those existing ones.


2013 ◽  
Vol 411-414 ◽  
pp. 16-20 ◽  
Author(s):  
Zhi Cai Shi ◽  
Jin Zu Zhou ◽  
Yong Xiang Xia ◽  
Chao Gang Yu

RFID is a key technology that can be used to create the ubiquitous society. Owing to the characteristics of RFID systems, it may pose a serious threat to privacy and security. In order to solve these problems we proposed a novel mutual authentication protocol based on NTRU which can prevent tracing, eavesdropping, replay attack, and backward traceability effectively. This protocol uses less computing and memory resources, and it is very suitable to some low-cost RFID systems.


Author(s):  
Khwaja Mansoor ◽  
Anwar Ghani ◽  
Shehzad Ashraf Chaudhry ◽  
Shahaboddin Shamshirband ◽  
Shahbaz Ahmed Khan Ghayyur ◽  
...  

Radio Frequency Identification (RFID) devices use radio waves to relay identifying information to an electronic reader using low-cost RFID Tag. RFID is expected to replace the conventional bar-code identification system due to its advantage like real-time recognition of a considerable number of objects. However, in RFID systems an attacker can get the tag that may lead to various security threats, and the limited computation power of RFID tags can cause delay. Lightweight authentication protocols proposed using cryptographic algorithms (one-way hash function, symmetric key encryption/decryption, and exclusive-OR) in order to cope with these problems. One such lightweight cryptographic protocol has been presented by Gope and Hwang using RFID systems. However, it analyzed in this article that their protocol is infeasible and vulnerable to Collision Attack, Denial-of-service (DoS), and Stolen verifier Attacks. A realistic, lightweight authentication protocol has been presented in this article to ensure protection against the mentioned attacks for IoT based RFID system. The proposed protocol has been formally analyzed using BAN logic and ProVerif as well as also analyzed informally using security requirement. The results show that the proposed protocol outperforms the existing protocols not only in security enhancements but also in terms of computation and communication complexity. Furthermore, the proposed protocol has also been analyzed for storage complexity.


Sign in / Sign up

Export Citation Format

Share Document