BibTex RIS Cite
Year 2015, Volume: 36 Issue: 3, 1400 - 1406, 13.05.2015

Abstract

References

  • A.X. Liu, L.A. Bailey, "PAP: a privacy and authentication protocol for passive RFID tags", Computer Communications 32, 1194-1199 , 2009.
  • Mu’awyaNaser, Pedro Peris-Lopez, Rahmat Budiarto, Benjamin Ramos Alvarez, "A note on the security of PAP" , Computer Communications 34, 2248–2249, 2011.
  • WalidI. Khedr, "SRFID: A hash-based security scheme for low cost RFID systems", Egyptian Informatics Journal 14, 89-98, 2013.
  • Tzu-Chang Yeh, Chien-Hung Wua, Yuh-Min Tseng, "Improvement of the RFID authentication scheme based on quadratic residues", Computer Communications 34, 337- 341, 2011.
  • Jung-sikCho, Sang-Soo Yeo, Sung Kwon Kim, "Securing against brute-force attack: A hash- based RFID mutual authentication protocol using a secret value", Computer Communications 34, 391-397, 2011.
  • HyunsungKim, "RFID Mutual Authentication Protocol based on Synchronized Secret", International Journal of Security and Its Applications, Vol. 7, No. 4, 2013.
  • Robin Doss, Wanlei Zhou, Shui Yu and Longxiang Gao, "A Novel Mutual Authentication Scheme with Minimum Disclosure for RFID Systems", ISSNIP, 544-549, 2011.

A multi authentication scheme for RFID systems

Year 2015, Volume: 36 Issue: 3, 1400 - 1406, 13.05.2015

Abstract

Abstract. In this paper, a new design and robust security in RFID system is proposed which is based on hidden data synchronization. Scheme prepare multi authentication that authenticate tag and reader to server and server for tag and reader, unlike the study protocol was doing. It means that the relationship between Tag- reader and reader-server are both unsafe assumptions. Hash functions used in the project are limited and some Hash values already stored by the server on tag, until the tag will have to be calculated every time the query is computed only once we hash in tag. TAG ID in any way change the query that is used to securely synchronize done and makes the protocol attacks such as eavesdropping, relay, tracking and DOS is resistant. We have used PRNG function to generate pseudo-random numbers. Security analysis relevant to this project shows that the proposed scheme is robust against attacks.

References

  • A.X. Liu, L.A. Bailey, "PAP: a privacy and authentication protocol for passive RFID tags", Computer Communications 32, 1194-1199 , 2009.
  • Mu’awyaNaser, Pedro Peris-Lopez, Rahmat Budiarto, Benjamin Ramos Alvarez, "A note on the security of PAP" , Computer Communications 34, 2248–2249, 2011.
  • WalidI. Khedr, "SRFID: A hash-based security scheme for low cost RFID systems", Egyptian Informatics Journal 14, 89-98, 2013.
  • Tzu-Chang Yeh, Chien-Hung Wua, Yuh-Min Tseng, "Improvement of the RFID authentication scheme based on quadratic residues", Computer Communications 34, 337- 341, 2011.
  • Jung-sikCho, Sang-Soo Yeo, Sung Kwon Kim, "Securing against brute-force attack: A hash- based RFID mutual authentication protocol using a secret value", Computer Communications 34, 391-397, 2011.
  • HyunsungKim, "RFID Mutual Authentication Protocol based on Synchronized Secret", International Journal of Security and Its Applications, Vol. 7, No. 4, 2013.
  • Robin Doss, Wanlei Zhou, Shui Yu and Longxiang Gao, "A Novel Mutual Authentication Scheme with Minimum Disclosure for RFID Systems", ISSNIP, 544-549, 2011.
There are 7 citations in total.

Details

Journal Section Special
Authors

Reza Parsamehr

Fereshteh Ghasemi This is me

Publication Date May 13, 2015
Published in Issue Year 2015 Volume: 36 Issue: 3

Cite

APA Parsamehr, R., & Ghasemi, F. (2015). A multi authentication scheme for RFID systems. Cumhuriyet Üniversitesi Fen Edebiyat Fakültesi Fen Bilimleri Dergisi, 36(3), 1400-1406.
AMA Parsamehr R, Ghasemi F. A multi authentication scheme for RFID systems. Cumhuriyet Üniversitesi Fen Edebiyat Fakültesi Fen Bilimleri Dergisi. May 2015;36(3):1400-1406.
Chicago Parsamehr, Reza, and Fereshteh Ghasemi. “A Multi Authentication Scheme for RFID Systems”. Cumhuriyet Üniversitesi Fen Edebiyat Fakültesi Fen Bilimleri Dergisi 36, no. 3 (May 2015): 1400-1406.
EndNote Parsamehr R, Ghasemi F (May 1, 2015) A multi authentication scheme for RFID systems. Cumhuriyet Üniversitesi Fen Edebiyat Fakültesi Fen Bilimleri Dergisi 36 3 1400–1406.
IEEE R. Parsamehr and F. Ghasemi, “A multi authentication scheme for RFID systems”, Cumhuriyet Üniversitesi Fen Edebiyat Fakültesi Fen Bilimleri Dergisi, vol. 36, no. 3, pp. 1400–1406, 2015.
ISNAD Parsamehr, Reza - Ghasemi, Fereshteh. “A Multi Authentication Scheme for RFID Systems”. Cumhuriyet Üniversitesi Fen Edebiyat Fakültesi Fen Bilimleri Dergisi 36/3 (May 2015), 1400-1406.
JAMA Parsamehr R, Ghasemi F. A multi authentication scheme for RFID systems. Cumhuriyet Üniversitesi Fen Edebiyat Fakültesi Fen Bilimleri Dergisi. 2015;36:1400–1406.
MLA Parsamehr, Reza and Fereshteh Ghasemi. “A Multi Authentication Scheme for RFID Systems”. Cumhuriyet Üniversitesi Fen Edebiyat Fakültesi Fen Bilimleri Dergisi, vol. 36, no. 3, 2015, pp. 1400-6.
Vancouver Parsamehr R, Ghasemi F. A multi authentication scheme for RFID systems. Cumhuriyet Üniversitesi Fen Edebiyat Fakültesi Fen Bilimleri Dergisi. 2015;36(3):1400-6.