Cryptanalysis and improvement of a group RFID authentication protocol
- PDF / 455,227 Bytes
- 10 Pages / 595.276 x 790.866 pts Page_size
- 23 Downloads / 216 Views
(0123456789().,-volV)(0123456789(). ,- volV)
Cryptanalysis and improvement of a group RFID authentication protocol Nasrollah Pakniat1
•
Ziba Eslami2
Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract In recent years, radio frequency identification (RFID) systems have become popular for identification. The key technology to protect the security of RFID systems is mutual authentication between the tags and the server. To enhance the efficiency of RFID systems, recently, Liu et al. proposed a group authentication protocol based on the concept of secret sharing. In this paper, we show that Liu et al.’s protocol falls short of providing security requirements. More specifically, we prove that in their protocol, authenticity of the tags to the server can not be achieved and on top of that the scheme can not be used more than once. We further propose a group mutual authentication protocol for RFID tags to overcome the mentioned drawbacks and prove that our proposal is secure. The results of analyzing the performance of the proposed protocol and its comparison with existing literature indicate that it outperforms current secure RFID authentication protocols. Keywords RFID Mutual authentication Secret sharing Cheater identification
1 Introduction Radio frequency identification system (RFID) is an automatic technology that aids to identify objects, record metadata or control individual targets through radio waves [1, 2]. Typically, RFID systems consist of tags, readers and backend servers. Through broadcasting RF signals, the readers can inquire tags of their identifications and contents. The corresponding data are then read or updated by servers. Due to their low cost, stability and the property of identification without physical contact, RFIDs have been used in many applications, such as access control, file tracking, race timing, supply chain management, and smart labels. The widespread deployment of RFID systems enhances the efficiency and convenience, however, it also & Nasrollah Pakniat [email protected] Ziba Eslami [email protected] 1
Information Science Research Center, Iranian Research Institute for Information Science and Technology (IRANDOC), Tehran, Iran
2
Department of Data and Computer Science, Shahid Beheshti University, G.C., Tehran, Iran
introduces potential security threats and risks to our life. Forging of participated entities (either tags or servers) is one key threat. Secure RFID systems, the same as many other similar scenarios [3–5], require a mechanism for mutual authentication whereby qualified tags can recognize qualified servers and vice versa so that any attempt to forge tags or servers is detected. Another threat is disclosure of sensitive data since the co-related information of tags (labeled on products) might be utilized to reveal a user’s identity, his location, his movement, or his habits. Therefore, designing a secure RFID authentication solution which is capable of providing both identity privacy (anonymity) and mutual authentication is quite
Data Loading...