A two-step mutual authentication protocol based on randomized hash-lock for small RFID networks


Autoria(s): Lee, Kaleb
Data(s)

02/09/2010

Resumo

RFID has been widely used in today's commercial and supply chain industry, due to the significant advantages it offers and the relatively low production cost. However, this ubiquitous technology has inherent problems in security and privacy. This calls for the development of simple, efficient and cost effective mechanisms against a variety of security threats. This paper proposes a two-step authentication protocol based on the randomized hash-lock scheme proposed by S. Weis in 2003. By introducing additional measures during the authentication process, this new protocol proves to enhance the security of RFID significantly, and protects the passive tags from almost all major attacks, including tag cloning, replay, full-disclosure, tracking, and eavesdropping. Furthermore, no significant changes to the tags is required to implement this protocol, and the low complexity level of the randomized hash-lock algorithm is retained.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/35665/

Relação

http://eprints.qut.edu.au/35665/1/c35665.pdf

http://www.sci.usq.edu.au/conferences/ICDKE/index.html

Lee, Kaleb (2010) A two-step mutual authentication protocol based on randomized hash-lock for small RFID networks. In International Conference on Data and Knowledge Engineering (ICDKE), 1-3 September 2010, Melbourne.

Direitos

Copyright 2010 Please consult the author.

Fonte

School of Curriculum; Faculty of Science and Technology; Information Security Institute

Palavras-Chave #100504 Data Communications #100510 Wireless Communications #RFID Security #Authentication Protocol
Tipo

Conference Item