A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lim, Jihwan | - |
dc.contributor.author | Oh, Heekuck | - |
dc.contributor.author | Kim, Sangjin | - |
dc.date.accessioned | 2021-06-23T18:40:47Z | - |
dc.date.available | 2021-06-23T18:40:47Z | - |
dc.date.issued | 2008-00 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/43070 | - |
dc.description.abstract | The recently proposed Radio Frequency Identification (RFID) authentication protocol based on a hashing function can be divided into two types according to the type of information used for authentication between a reader and a tag: either a value fixed or one updated dynamically in a tag. In this study we classify the RFID authentication protocol into a static ID-based and a dynamic-ID based protocol and then analyze their respective strengths and weaknesses and the previous protocols in the static/dynamic ID-based perspectives. Also, we define four security requirements that must be considered in designing the RFID authentication protocol including mutual authentication, confidentiality, indistinguishability and forward security. Based on these requirements, we suggest a secure and efficient mutual authentication protocol. The proposed protocol is a dynamic ID-based mutual authentication protocol designed to meet requirements of both indistinguishability and forward security by ensuring the unlinkability of tag responses among sessions. Thus, the protocol can provide more strengthened user privacy compared to previous protocols and recognizes a tag efficiently in terms of the operation quantity of tags and database. © 2008 Springer-Verlag Berlin Heidelberg. | - |
dc.format.extent | 12 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Springer | - |
dc.title | A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection | - |
dc.type | Article | - |
dc.publisher.location | 독일 | - |
dc.identifier.doi | 10.1007/978-3-540-79104-1_20 | - |
dc.identifier.scopusid | 2-s2.0-41549156956 | - |
dc.identifier.bibliographicCitation | Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings, pp 278 - 289 | - |
dc.citation.title | Information Security Practice and Experience 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings | - |
dc.citation.startPage | 278 | - |
dc.citation.endPage | 289 | - |
dc.type.docType | Conference Paper | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Authentication | - |
dc.subject.keywordPlus | Data privacy | - |
dc.subject.keywordPlus | Radio frequency identification (RFID) | - |
dc.subject.keywordPlus | User interfaces | - |
dc.subject.keywordPlus | Authentication protocols | - |
dc.subject.keywordPlus | RFID mutual authentication protocols | - |
dc.subject.keywordPlus | User Privacy | - |
dc.subject.keywordPlus | Network protocols | - |
dc.subject.keywordAuthor | Authentication | - |
dc.subject.keywordAuthor | RFID | - |
dc.subject.keywordAuthor | User Privacy | - |
dc.identifier.url | https://link.springer.com/chapter/10.1007/978-3-540-79104-1_20 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.