中国邮电高校学报(英文) ›› 2015, Vol. 22 ›› Issue (6): 27-35.doi: 10.1016/S1005-8885(15)60690-2

• Artificial Intelligence • 上一篇    下一篇

RFID mutual-authentication protocol with synchronous updated-keys based on Hash function

Zhang Xiaohong, Hu Yingmeng   

  1. School of Information Engineering, Jiangxi University of Science and Technology,Ganzhou 341000, China
  • 收稿日期:2015-01-07 修回日期:2015-09-28 出版日期:2015-12-31 发布日期:2015-12-30
  • 通讯作者: 张小红 E-mail:xiaohongzh@263.net
  • 基金资助:
    This work was supported by the National Natural Science Foundation of China (11062002, 61363076), the Technology Project of Jiangxi Provincial Department of Education (GJJ14439, GJJ14465), the Natural Science Foundation of Jiangxi Province (20142BAB207020), the Innovation Fund for Graduate Students in Jiangxi Province (YC2014-S370).

RFID mutual-authentication protocol with synchronous updated-keys based on Hash function

Zhang Xiaohong, Hu Yingmeng   

  1. School of Information Engineering, Jiangxi University of Science and Technology,Ganzhou 341000, China
  • Received:2015-01-07 Revised:2015-09-28 Online:2015-12-31 Published:2015-12-30
  • Contact: Xiao-Hong ZHANG E-mail:xiaohongzh@263.net
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (11062002, 61363076), the Technology Project of Jiangxi Provincial Department of Education (GJJ14439, GJJ14465), the Natural Science Foundation of Jiangxi Province (20142BAB207020), the Innovation Fund for Graduate Students in Jiangxi Province (YC2014-S370).

摘要: With the wide application of radio frequency identification (RFID) technology, its security privacy issues are becoming more and more prominent. A RFID mutual-authentication protocol with synchronous updated-keys based on Hash function is proposed to tackle those problems in this paper. An updated mechanism of the dynamic tag keys is introduced and a self-synchronized scheme is designed in the protocol, which has achieved the second verification for the tags. The security of the protocol is verified and analyzed by the Burrows-Abadi-Needham (BAN) logic and the attack models, moreover it has been compared with the existing schemes of security properties and its storage and computational performance. The results show that the proposed protocol has the ability to considerably reduce the amount of computation between tags and back-end database, and enhance the search efficiency of the whole system without the additional cost of the tags. It can satisfy safe requirements of RFID system effectively, also improve the authentication efficiency. The proposed protocol is more suitable for the low cost RFID system.

关键词: RFID, mutual-authentication protocol, Hash function, synchronization, BAN logic

Abstract: With the wide application of radio frequency identification (RFID) technology, its security privacy issues are becoming more and more prominent. A RFID mutual-authentication protocol with synchronous updated-keys based on Hash function is proposed to tackle those problems in this paper. An updated mechanism of the dynamic tag keys is introduced and a self-synchronized scheme is designed in the protocol, which has achieved the second verification for the tags. The security of the protocol is verified and analyzed by the Burrows-Abadi-Needham (BAN) logic and the attack models, moreover it has been compared with the existing schemes of security properties and its storage and computational performance. The results show that the proposed protocol has the ability to considerably reduce the amount of computation between tags and back-end database, and enhance the search efficiency of the whole system without the additional cost of the tags. It can satisfy safe requirements of RFID system effectively, also improve the authentication efficiency. The proposed protocol is more suitable for the low cost RFID system.

Key words: RFID, mutual-authentication protocol, Hash function, synchronization, BAN logic

中图分类号: