Back to Search Start Over

Secure RFID Authentication Schemes Based on Security Analysis and Improvements of the USI Protocol

Authors :
Lijun Gao
Lu Zhang
Feng Lin
Maode Ma
Source :
IEEE Access, Vol 7, Pp 8376-8384 (2019)
Publication Year :
2019
Publisher :
IEEE, 2019.

Abstract

Wireless radio frequency identification (RFID) has been widely used as the core technology of the Internet of Things, but it also brings many potential security risks. In this paper, two typical RFID security authentication protocols are analyzed in depth. The results show that the two protocols have security risks, and two targeted attack methods are proposed. Next, two RFID security authentication protocols which can resist the DoS, replay, and tracing attacks are designed. The first protocol uses index grouping and dynamic renewal mechanism. Since the Rabin public key encryption algorithm verification only requires square and modulo operations, the second protocol introduces the public key encryption algorithm into the cost-sensitive RFID tag, and formally verifies the functionality of the proposed scheme by SPIN. Furthermore, the security of the protocol is proven by the BAN logic. The grouping index method can effectively improve the ability to locate tags in a large database and enhance the practicability of the protocol. The introduction of the Rabin public key algorithm improves the security of the protocol under the condition of cost control.

Details

Language :
English
ISSN :
21693536
Volume :
7
Database :
Directory of Open Access Journals
Journal :
IEEE Access
Publication Type :
Academic Journal
Accession number :
edsdoj.bc015258b14d412c93dc42d4b2229681
Document Type :
article
Full Text :
https://doi.org/10.1109/ACCESS.2018.2890282