TY - GEN
T1 - A novel hash-based RFID grouping authentication protocol on tag groups and multiple readers
AU - Shen, Jian
AU - Tan, Haowen
AU - Ren, Yongjun
AU - Zheng, Yuhui
AU - Wang, Jin
N1 - Publisher Copyright:
© 2015 The authors and IOS Press. All rights reserved.
PY - 2015
Y1 - 2015
N2 - Recently, several grouping protocols have been proposed to manage RFID authentication process in the occasion of identifying large numbers of passive tags simultaneously, which is a relatively hot topic in market promotion. In these protocols, however, the identifiers of tags are unsafely transmitted, which is vulnerable to privacy information leakage through eavesdropping. On the other hand, these protocols suffer from tracking problem. In this paper, we propose a novel hash-based grouping authentication protocol on tag groups and multiple readers. In our design, the RFID system is capable of identifying specific tag groups according to real requirements. The messages transmitted between RFID entities are under protection to avoid tracking and eavesdropping. We present two types of verifying methods for the backend processing system (BPS). In addition, mutual authentication is available between the BPS and reader or the reader and tags. The security analysis shows that our protocol is resistant to various attacks and achieves wide compliance to low-cost passive tags.
AB - Recently, several grouping protocols have been proposed to manage RFID authentication process in the occasion of identifying large numbers of passive tags simultaneously, which is a relatively hot topic in market promotion. In these protocols, however, the identifiers of tags are unsafely transmitted, which is vulnerable to privacy information leakage through eavesdropping. On the other hand, these protocols suffer from tracking problem. In this paper, we propose a novel hash-based grouping authentication protocol on tag groups and multiple readers. In our design, the RFID system is capable of identifying specific tag groups according to real requirements. The messages transmitted between RFID entities are under protection to avoid tracking and eavesdropping. We present two types of verifying methods for the backend processing system (BPS). In addition, mutual authentication is available between the BPS and reader or the reader and tags. The security analysis shows that our protocol is resistant to various attacks and achieves wide compliance to low-cost passive tags.
UR - http://www.scopus.com/inward/record.url?scp=84926513159&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84926513159&partnerID=8YFLogxK
U2 - 10.3233/978-1-61499-484-8-2162
DO - 10.3233/978-1-61499-484-8-2162
M3 - Conference contribution
AN - SCOPUS:84926513159
T3 - Frontiers in Artificial Intelligence and Applications
SP - 2162
EP - 2171
BT - Intelligent Systems and Applications - Proceedings of the International Computer Symposium, ICS 2014
A2 - Chu, William Cheng-Chung
A2 - Yang, Stephen Jenn-Hwa
A2 - Chao, Han-Chieh
PB - IOS Press
T2 - International Computer Symposium, ICS 2014
Y2 - 12 December 2014 through 14 December 2014
ER -