Secure RFID authentication schemes based on security analysis and improvements of the USI protocol

Wireless radio frequency identification (RFID) has been widely used as the core technology of the Internet of Things, but it also brings many potential security risks. In this paper, two typical RFID security authentication protocols are analyzed in depth. The results show that the two protocols hav...

Full description

Saved in:
Bibliographic Details
Main Authors: Gao, Lijun, Zhang, Lu, Lin, Feng, Ma, Maode
Other Authors: School of Electrical and Electronic Engineering
Format: Article
Language:English
Published: 2019
Subjects:
Online Access:https://hdl.handle.net/10356/105994
http://hdl.handle.net/10220/48844
http://dx.doi.org/10.1109/ACCESS.2018.2890282
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-105994
record_format dspace
spelling sg-ntu-dr.10356-1059942019-12-06T22:02:27Z Secure RFID authentication schemes based on security analysis and improvements of the USI protocol Gao, Lijun Zhang, Lu Lin, Feng Ma, Maode School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering RFID Index Grouping Wireless radio frequency identification (RFID) has been widely used as the core technology of the Internet of Things, but it also brings many potential security risks. In this paper, two typical RFID security authentication protocols are analyzed in depth. The results show that the two protocols have security risks, and two targeted attack methods are proposed. Next, two RFID security authentication protocols which can resist the DoS, replay, and tracing attacks are designed. The first protocol uses index grouping and dynamic renewal mechanism. Since the Rabin public key encryption algorithm verification only requires square and modulo operations, the second protocol introduces the public key encryption algorithm into the cost-sensitive RFID tag, and formally verifies the functionality of the proposed scheme by SPIN. Furthermore, the security of the protocol is proven by the BAN logic. The grouping index method can effectively improve the ability to locate tags in a large database and enhance the practicability of the protocol. The introduction of the Rabin public key algorithm improves the security of the protocol under the condition of cost control. Published version 2019-06-19T09:21:01Z 2019-12-06T22:02:27Z 2019-06-19T09:21:01Z 2019-12-06T22:02:27Z 2019 Journal Article Gao, L., Zhang, L., Lin, F., & Ma, M. (2019). Secure RFID authentication schemes based on security analysis and improvements of the USI protocol. IEEE Access, 7, 8376-8384. doi:10.1109/ACCESS.2018.2890282 https://hdl.handle.net/10356/105994 http://hdl.handle.net/10220/48844 http://dx.doi.org/10.1109/ACCESS.2018.2890282 en IEEE Access © 2019 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. 9 p. application/pdf
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
topic DRNTU::Engineering::Electrical and electronic engineering
RFID
Index Grouping
spellingShingle DRNTU::Engineering::Electrical and electronic engineering
RFID
Index Grouping
Gao, Lijun
Zhang, Lu
Lin, Feng
Ma, Maode
Secure RFID authentication schemes based on security analysis and improvements of the USI protocol
description Wireless radio frequency identification (RFID) has been widely used as the core technology of the Internet of Things, but it also brings many potential security risks. In this paper, two typical RFID security authentication protocols are analyzed in depth. The results show that the two protocols have security risks, and two targeted attack methods are proposed. Next, two RFID security authentication protocols which can resist the DoS, replay, and tracing attacks are designed. The first protocol uses index grouping and dynamic renewal mechanism. Since the Rabin public key encryption algorithm verification only requires square and modulo operations, the second protocol introduces the public key encryption algorithm into the cost-sensitive RFID tag, and formally verifies the functionality of the proposed scheme by SPIN. Furthermore, the security of the protocol is proven by the BAN logic. The grouping index method can effectively improve the ability to locate tags in a large database and enhance the practicability of the protocol. The introduction of the Rabin public key algorithm improves the security of the protocol under the condition of cost control.
author2 School of Electrical and Electronic Engineering
author_facet School of Electrical and Electronic Engineering
Gao, Lijun
Zhang, Lu
Lin, Feng
Ma, Maode
format Article
author Gao, Lijun
Zhang, Lu
Lin, Feng
Ma, Maode
author_sort Gao, Lijun
title Secure RFID authentication schemes based on security analysis and improvements of the USI protocol
title_short Secure RFID authentication schemes based on security analysis and improvements of the USI protocol
title_full Secure RFID authentication schemes based on security analysis and improvements of the USI protocol
title_fullStr Secure RFID authentication schemes based on security analysis and improvements of the USI protocol
title_full_unstemmed Secure RFID authentication schemes based on security analysis and improvements of the USI protocol
title_sort secure rfid authentication schemes based on security analysis and improvements of the usi protocol
publishDate 2019
url https://hdl.handle.net/10356/105994
http://hdl.handle.net/10220/48844
http://dx.doi.org/10.1109/ACCESS.2018.2890282
_version_ 1681043610836926464