A secure RFID authentication protocol adopting error correction code.

ScientificWorldJournal

Department of Computer Science, National Tsing Hua University, Hsinchu 300, Taiwan.

Published: February 2015

RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4052535PMC
http://dx.doi.org/10.1155/2014/704623DOI Listing

Publication Analysis

Top Keywords

authentication protocol
8
protocol adopting
8
adopting error
8
error correction
8
correction code
8
code rfid
8
protocol
6
secure rfid
4
rfid authentication
4
rfid
4

Similar Publications

The proliferation of the Internet of Things (IoT) has worsened the challenge of maintaining data and user privacy. IoT end devices, often deployed in unsupervised environments and connected to open networks, are susceptible to physical tampering and various other security attacks. Thus, robust, efficient authentication and key agreement (AKA) protocols are essential to protect data privacy during exchanges between end devices and servers.

View Article and Find Full Text PDF

The Internet of Vehicles (IoV), a key component of smart transportation systems, leverages 5G communication for low-latency data transmission, facilitating real-time interactions between vehicles, roadside units (RSUs), and sensor networks. However, the open nature of 5G communication channels exposes IoV systems to significant security threats, such as eavesdropping, replay attacks, and message tampering. To address these challenges, this paper proposes the Efficient Cluster-based Mutual Authentication and Key Update Protocol (ECAUP) designed to secure IoV systems within 5G-enabled sensor networks.

View Article and Find Full Text PDF

The integration of liveness detection into biometric systems is crucial for countering spoofing attacks and enhancing security. This study investigates the efficacy of photoplethysmography (PPG) signals, which offer distinct advantages over traditional biometric techniques. PPG signals are non-invasive, inherently contain liveness information that is highly resistant to spoofing, and are cost-efficient, making them a superior alternative for biometric authentication.

View Article and Find Full Text PDF

With the advancement of this digital era and the emergence of DApps and Blockchain, secure, robust and transparent network transaction has become invaluable today. These traditional methods of securing the transactions and maintaining transparency have encountered many challenges. It includes some such issues as follows: data privacy, centralized vulnerability, inefficiency in fraud detection and much more.

View Article and Find Full Text PDF

Increasing consumer concerns underscore the importance of verifying the practices and origins of food, especially certified premium products. The aim of this study was to evaluate the ability of Fourier-transform mid-infrared (FT-MIR) spectroscopy to authenticate animal welfare parameters, farming practices, and dairy systems. Data on farm characteristics were obtained from the Parmigiano Reggiano Consortium in northern Italy.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!