Design and Analysis of a Low Cost Multiple-Secret-Key RFID Security Protocol

被引:0
|
作者
Gao, Lijun [1 ,3 ]
Ma, Maode [2 ]
Shu, Yantai [3 ]
Liu, Chunfeng [3 ]
机构
[1] Shenyang Aerosp Univ, Dept Comp Sci & Technol, Shenyang, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore, Singapore
[3] Tianjin Univ, Sch Comp Sci & Technol, Tianjin, Peoples R China
关键词
RFID; Security; XOR operation on large integers; multiple solution equations;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Radio Frequency Identification (RFID) will become one of the most widely used devices in the near future. However, the major barrier that the RFID systems are facing presently is the issue of security. In this paper, we propose a low-cost multiple-secret-key RFID authentication protocol based on the XOR operation on large integers and multiple solution equations. The proposed protocol can achieve major security requirements in the deployment of the RFID systems with ability to prevent eavesdropping attacks, spoofing attacks, cloning attacks, and encryption algorithm explaining attacks.
引用
收藏
页码:914 / 917
页数:4
相关论文
共 50 条
  • [41] The Design of an RFID Security Protocol For Saving in DB Transaction Costs
    Paek, Kwang-Jin
    Mah, Pyeong Soo
    Lee, Chang Wook
    Song, Ui-Sung
    11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 1937 - 1939
  • [42] Security analysis of an RFID protocol based on insubvertible encryption
    Wei, Yongzhuang
    Ouyang, Ning
    Ma, Chunbo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49 (05): : 958 - 961
  • [43] Security Analysis of a Mutual Authentication Protocol for RFID Systems
    Yang, Yuanyuan
    Lu, Zhen
    Chen, Zhuo
    Wei, Xiang
    Gu, Jian
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 252 - 255
  • [44] A Design of Authentication Protocol for Multi-key RFID Tag
    Kim, Jiyeon
    Jung, Jongjin
    Ko, Hoon
    Ki, Boyeon
    Joe, Susan
    Lee, Yongjun
    Chang, Yunseok
    Lee, Kyoonha
    ADVANCES IN WEB AND NETWORK TECHNOLOGIES, AND INFORMATION MANAGEMENT, PROCEEDINGS, 2007, 4537 : 644 - +
  • [45] Security analysis of RFID based on multiple readers
    Ma, Jia-lin
    Wei, Xu
    Liu, Jie
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 265 - 268
  • [46] Security Analysis of RFID based on Multiple Readers
    Jin, Bo
    Jin, Hongyu
    CEIS 2011, 2011, 15
  • [47] Security of a semi-quantum protocol where reflections contribute to the secret key
    Walter O. Krawec
    Quantum Information Processing, 2016, 15 : 2067 - 2090
  • [48] Security of a semi-quantum protocol where reflections contribute to the secret key
    Krawec, Walter O.
    QUANTUM INFORMATION PROCESSING, 2016, 15 (05) : 2067 - 2090
  • [49] Security and Improvement of an Authenticated Group Key Transfer Protocol Based on Secret Sharing
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (05): : 1943 - 1949
  • [50] A One-way Hash based Low-cost Authentication Protocol with Forward Security in RFID System
    He Lei
    Lu Xin-mei
    Jin Song-he
    Cai Zeng-yu
    2010 2ND INTERNATIONAL ASIA CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS (CAR 2010), VOL 2, 2010, : 269 - 272