If traditional RFID privacy authentication protocols are applied to multi-server environment, such as RFID credit card system and supply chain, the tags will be vulnerable to insider attack, an attacks from an internal legal entity who impersonates as another legal entity to do authority-exceeding violation. In 2011, H.Ning, et.al's proposed a RFID authentication protocol based on key array to prevent authority-exceeding violation. But their scheme adopts static key mechanism, which may be a security risk. In this paper, we proposed an improved scheme that use key array to avoid insider attack. Furthermore, counter are also employed to resolve synchronization issue. The security analysis demonstrates that our protocol is reliable in advanced RFID systems. Additionally, the performance is evaluated and compared with other related protocols to show that our protocol can improve the reliability and efficiency of RFID systems with insignificantly increased complexity. © 2012 Springer-Verlag.
CITATION STYLE
Bai, Y., & Liu, Y. (2012). A synchronization strengthen RFID authentication protocol based on key array. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7530 LNAI, pp. 113–119). https://doi.org/10.1007/978-3-642-33478-8_15
Mendeley helps you to discover research relevant for your work.