A synchronization strengthen RFID authentication protocol based on key array

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

If traditional RFID privacy authentication protocols are applied to multi-server environment, such as RFID credit card system and supply chain, the tags will be vulnerable to insider attack, an attacks from an internal legal entity who impersonates as another legal entity to do authority-exceeding violation. In 2011, H.Ning, et.al's proposed a RFID authentication protocol based on key array to prevent authority-exceeding violation. But their scheme adopts static key mechanism, which may be a security risk. In this paper, we proposed an improved scheme that use key array to avoid insider attack. Furthermore, counter are also employed to resolve synchronization issue. The security analysis demonstrates that our protocol is reliable in advanced RFID systems. Additionally, the performance is evaluated and compared with other related protocols to show that our protocol can improve the reliability and efficiency of RFID systems with insignificantly increased complexity. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Bai, Y., & Liu, Y. (2012). A synchronization strengthen RFID authentication protocol based on key array. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7530 LNAI, pp. 113–119). https://doi.org/10.1007/978-3-642-33478-8_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free