Advanced Search
    Wang Shaohui, Liu Sujuan, Chen Danwei. Scalable RFID Mutual Authentication Protocol with Backward Privacy[J]. Journal of Computer Research and Development, 2013, 50(6): 1276-1284.
    Citation: Wang Shaohui, Liu Sujuan, Chen Danwei. Scalable RFID Mutual Authentication Protocol with Backward Privacy[J]. Journal of Computer Research and Development, 2013, 50(6): 1276-1284.

    Scalable RFID Mutual Authentication Protocol with Backward Privacy

    • Anonymous authentication mechanisms can be used in RFID systems to preserve the privacy of the RFID tags. Scalability problem and backward privacy problem are two important issues considered in practice. In this paper, security analysis is presented on three recently proposed RFID authentication protocols satisfying scalability and backward privacy. The research shows that ACP protocol can not provide the property of backward privacy; the G-I protocol can not resist dysynchronization attack, i.e. the adversary can make the secrets stored in tag and reader unmatched, which results in the tag and the reader in a desynchronized state and renders future authentication impossible; and the MMR protocol can not resist active attack, because the adversary can extract tags all secrets via querying the tag and analyzing the messages sent by the tag. In addition, we present a modified scalable hash-based mutual authentication protocol with less storage and computation requirements than G-I. And we prove our scheme can provide the property of backward privacy and resist the desynchronization attack.
    • loading

    Catalog

      Turn off MathJax
      Article Contents

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return