SRFID: A hash-based security scheme for low cost RFID systems

Radio Frequency Identification (RFID) technology is a promising technology. It uses radio waves to identify objects. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. However, this ubiquit...

Full description

Bibliographic Details
Main Author: Walid I. Khedr
Format: Article
Language:English
Published: Elsevier 2013-03-01
Series:Egyptian Informatics Journal
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S1110866513000054
id doaj-d443b1682a0d40dfaa1d48903663870f
record_format Article
spelling doaj-d443b1682a0d40dfaa1d48903663870f2021-07-02T04:42:59ZengElsevierEgyptian Informatics Journal1110-86652013-03-01141899810.1016/j.eij.2013.02.001SRFID: A hash-based security scheme for low cost RFID systemsWalid I. KhedrRadio Frequency Identification (RFID) technology is a promising technology. It uses radio waves to identify objects. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. However, this ubiquitous technology has inherited problems in security and privacy, due to the powerful tracking capability of the tags. This paper proposes a new simple, low cost, and scalable security scheme relying on one-way hash functions and synchronized secret information. The proposed scheme provides a two steps mutual authentication between the backend server and the tag which does not require a secure channel between the tag reader and the backend server to complete the authentication process. The proposed scheme meets the requirements for tag delegation and secure tag ownership transfer. The general idea is to change the ID of a tag on every read attempt in a secure and synchronized manner. This means that attempts like eavesdropping, replay attacks, tag cloning, tag tracing, denial of service attack, or man-in-the-middle attacks cannot compromise the scheme. Our analysis results show that the proposed scheme outperforms existing schemes in terms of security and performance.http://www.sciencedirect.com/science/article/pii/S1110866513000054RFIDAuhenticationHash functionPrivacySecurity
collection DOAJ
language English
format Article
sources DOAJ
author Walid I. Khedr
spellingShingle Walid I. Khedr
SRFID: A hash-based security scheme for low cost RFID systems
Egyptian Informatics Journal
RFID
Auhentication
Hash function
Privacy
Security
author_facet Walid I. Khedr
author_sort Walid I. Khedr
title SRFID: A hash-based security scheme for low cost RFID systems
title_short SRFID: A hash-based security scheme for low cost RFID systems
title_full SRFID: A hash-based security scheme for low cost RFID systems
title_fullStr SRFID: A hash-based security scheme for low cost RFID systems
title_full_unstemmed SRFID: A hash-based security scheme for low cost RFID systems
title_sort srfid: a hash-based security scheme for low cost rfid systems
publisher Elsevier
series Egyptian Informatics Journal
issn 1110-8665
publishDate 2013-03-01
description Radio Frequency Identification (RFID) technology is a promising technology. It uses radio waves to identify objects. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. However, this ubiquitous technology has inherited problems in security and privacy, due to the powerful tracking capability of the tags. This paper proposes a new simple, low cost, and scalable security scheme relying on one-way hash functions and synchronized secret information. The proposed scheme provides a two steps mutual authentication between the backend server and the tag which does not require a secure channel between the tag reader and the backend server to complete the authentication process. The proposed scheme meets the requirements for tag delegation and secure tag ownership transfer. The general idea is to change the ID of a tag on every read attempt in a secure and synchronized manner. This means that attempts like eavesdropping, replay attacks, tag cloning, tag tracing, denial of service attack, or man-in-the-middle attacks cannot compromise the scheme. Our analysis results show that the proposed scheme outperforms existing schemes in terms of security and performance.
topic RFID
Auhentication
Hash function
Privacy
Security
url http://www.sciencedirect.com/science/article/pii/S1110866513000054
work_keys_str_mv AT walidikhedr srfidahashbasedsecurityschemeforlowcostrfidsystems
_version_ 1721339660552110080