Advertisement

A Novel Hash-Based Mutual RFID Tag Authentication Protocol

  • Mansi Saxena
  • Rabindra Nath Shaw
  • Jitendra Kumar VermaEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 847)

Abstract

Radio frequency identification (RFID) is an integral part of our life. This term is coined for short-range radio communication technology. It is used to send and receive the digital information between stationary location and non-stationary object or between movable objects. It automates the wireless technology using radio waves to identify an object. This technology has widespread applications in the field of security, access control, transportation, etc. In this paper, we analyze an existing RFID-based protocol and demonstrate that it is insecure against impersonation attack, man-in-middle attack, server-masquerading attack, insider attack, and denial-of-service. We also propose a novel protocol, namely Encrypted Tag Identity and Secret Value Protocol, to overcome the shortcomings and loopholes existing in the surveyed protocols.

Keywords

Impersonation attack Server masquerading Mutual authentication Public and private keys Secret value Random numbers 

References

  1. 1.
    Shepard, S.: RFID: Radio Frequency Identification. McGraw Hill Professional (2005)Google Scholar
  2. 2.
    Landt, J.: The history of RFID. IEEE Potentials 24(4), 8–11 (2005)CrossRefGoogle Scholar
  3. 3.
    Srivastava, K., Awasthi, A.K., Kaul, S.D., Mittal, R.: A hash based mutual RFID tag authentication protocol in telecare medicine information system. J. Med. Syst. 39(1), 153 (2015)CrossRefGoogle Scholar
  4. 4.
    Ohkubo, M., Suzuki, K., Kinoshita, S., et al.: Cryptographic approach to privacy-friendly tags. In: RFID Privacy Workshop, Cambridge, USA, vol. 82 (2003)Google Scholar
  5. 5.
    Center, A.-I.: 860 MHz-960 MHz Class-I radio frequency identification tag radio frequency & logical communication interface specification proposed recommendation version 1.0. 0 (2002)Google Scholar
  6. 6.
    Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Security in Pervasive Computing, pp. 201–212. Springer (2004)Google Scholar
  7. 7.
    Tsudik, G.: YA-TRAP: yet another trivial RFID authentication protocol. In: Pervasive Computing and Communications Workshops, 2006. PerCom Workshops 2006. Fourth Annual IEEE International Conference on, IEEE, pp. 4–7 (2006)Google Scholar
  8. 8.
    Tsudik, G.: A family of dunces: trivial RFID identification and authentication protocols. In: Privacy Enhancing Technologies, pp. 45–61. Springer (2007)Google Scholar
  9. 9.
    Chatmon, C., van Le, T., Burmester, M.: Secure anonymous RFID authentication protocols. Florida State University, Department of Computer Science, Tech. RepGoogle Scholar
  10. 10.
    Sun, P.R., Wang, B.H., Wu, F.: A new method to guard inpatient medication safety by the implementation of RFID. J. Med. Syst. 32(4), 327–332 (2008)CrossRefGoogle Scholar
  11. 11.
    Huang, H.-H., Ku, C.-Y.: A RFID grouping proof protocol for medication safety of inpatient. J. Med. Syst. 33(6), 467 (2009)CrossRefGoogle Scholar
  12. 12.
    Chien, H.-Y., Yang, C.-C., Wu, T.-C., Lee, C.-F.: Two RFID-based solutions to enhance inpatient medication safety. J. Med. Syst. 35(3), 369–375 (2011)CrossRefGoogle Scholar
  13. 13.
    Peris-Lopez, P., Orfila, A., Mitrokotsa, A., Van der Lubbe, J.C.: A comprehensive RFID solution to enhance inpatient medication safety. Int. J. Med. Inform. 80(1), 13–24 (2011)CrossRefGoogle Scholar
  14. 14.
    Yen, Y.-C., Lo, N.-W., Wu, T.-C.: Two RFID-based solutions for secure inpatient medication administration. J. Med. Syst. 36(5), 2769–2778 (2012)CrossRefGoogle Scholar
  15. 15.
    Kim, H.: Enhanced hash-based RFID mutual authentication protocol. In: Computer Applications for Security, Control and System Engineering, pp. 70–77. Springer (2012)Google Scholar
  16. 16.
    Kim, H.: RFID mutual authentication protocol based on synchronized secret. Int. J. Secur. Appl. 7(4), 37–50 (2013)Google Scholar
  17. 17.
    Chen, Y.-Y., Huang, D.-C., Tsai, M.-L., Jan, J.-K.: A design of tamper resistant prescription RFID access control system. J. Med. Syst. 36(5), 2795–2801 (2012)CrossRefGoogle Scholar
  18. 18.
    Cho, J.-S., Yeo, S.-S., Kim, S.K.: Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value. Comput. Commun. 34(3), 391–397 (2011)CrossRefGoogle Scholar
  19. 19.
    Suja, S., Arivarasi, A.: An RFID Authentication Protocol for Security and Privacy. ​In: International Conference on Computing and Control Engineering (2012)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.AbyM TechnologyNoidaIndia
  2. 2.School of Electrical Electronics & Communication EngineeringGalgotias UniversityGreater NoidaIndia
  3. 3.School of Computing Science & EngineeringGalgotias UniversityGreater NoidaIndia

Personalised recommendations