Symmetric key based RFID authentication protocol with a secure key-updating scheme

RFID technology is being widely employed in various pervasive applications. Therefore, security and privacy protection for RFID systems is an important issue that needs to be addressed. In this paper, we present a secure mutual authentication protocol for RFID systems that is based on symmetric key...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) s. 1 - 5
Hlavní autoři: Guangyu Zhu, Khan, Gul N.
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 01.05.2013
Témata:
ISBN:9781479900312, 1479900311
ISSN:0840-7789
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract RFID technology is being widely employed in various pervasive applications. Therefore, security and privacy protection for RFID systems is an important issue that needs to be addressed. In this paper, we present a secure mutual authentication protocol for RFID systems that is based on symmetric key technique with an efficient key updating mechanism. The objective is to improve the RFID system security against replay, de-synchronization, eavesdropping and man-in-the-middle attacks while maintaining lower computation, communication and storage. We also compare our authentication method with three recent protocols that deploy the same block cipher (XTEA) by implementing all the protocols on the same RF based hardware. Our proposed authentication protocol provides high security level and low computation and communication costs.
AbstractList RFID technology is being widely employed in various pervasive applications. Therefore, security and privacy protection for RFID systems is an important issue that needs to be addressed. In this paper, we present a secure mutual authentication protocol for RFID systems that is based on symmetric key technique with an efficient key updating mechanism. The objective is to improve the RFID system security against replay, de-synchronization, eavesdropping and man-in-the-middle attacks while maintaining lower computation, communication and storage. We also compare our authentication method with three recent protocols that deploy the same block cipher (XTEA) by implementing all the protocols on the same RF based hardware. Our proposed authentication protocol provides high security level and low computation and communication costs.
Author Guangyu Zhu
Khan, Gul N.
Author_xml – sequence: 1
  surname: Guangyu Zhu
  fullname: Guangyu Zhu
  organization: Dept. of Electr. & Comput. Eng., Ryerson Univ., Toronto, ON, Canada
– sequence: 2
  givenname: Gul N.
  surname: Khan
  fullname: Khan, Gul N.
  organization: Dept. of Electr. & Comput. Eng., Ryerson Univ., Toronto, ON, Canada
BookMark eNpVkMtOwkAYhceIiYC8gG7mBYr_dNrOzNLUoiQkJsiezOUfO0pb0g4xvD0Q2bj6cnIuizMho7ZrkZBHBnPGQD2XZVVW8xQYnxd5IUTGbshMCckyoRQA58XtP83SERmDzCARQqp7MhmGbwDIZJGNyfrz2DQY-2DpDx6p0QM6ul4sX6k-xBrbGKyOoWvpvu9iZ7sd_Q2xppoOaA89XkrJYe_OmfaLDrbGBh_Inde7AWdXTslmUW3K92T18bYsX1ZJUBAT7rzneYHe5MJA7sDkXBrplBUCmFRCc6e18TnzhhmvFRNOMm_TC88Wn5Knv9mAiNt9HxrdH7fXR_gJsf9VqA
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/CCECE.2013.6567741
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9781479900336
1479900338
147990032X
9781479900329
EndPage 5
ExternalDocumentID 6567741
Genre orig-research
GroupedDBID 29F
6IE
6IF
6IH
6IK
6IL
6IM
6IN
AAJGR
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IJVOP
IPLJI
M43
OCL
RIE
RIL
RIO
RNS
ID FETCH-LOGICAL-i90t-3dff356efb57b05d0b538b8d9c7701897a3daabf51fb1bfa917d81fc217d83da3
IEDL.DBID RIE
ISBN 9781479900312
1479900311
ISSN 0840-7789
IngestDate Wed Aug 27 04:12:20 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-3dff356efb57b05d0b538b8d9c7701897a3daabf51fb1bfa917d81fc217d83da3
PageCount 5
ParticipantIDs ieee_primary_6567741
PublicationCentury 2000
PublicationDate 2013-May
PublicationDateYYYYMMDD 2013-05-01
PublicationDate_xml – month: 05
  year: 2013
  text: 2013-May
PublicationDecade 2010
PublicationTitle 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)
PublicationTitleAbbrev CCECE
PublicationYear 2013
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0004864
ssj0001106840
Score 1.5282623
Snippet RFID technology is being widely employed in various pervasive applications. Therefore, security and privacy protection for RFID systems is an important issue...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Authentication
Ciphers
mutual authentication
privacy protection
Protocols
Radiofrequency identification
RFID
Servers
symmetric key algorithm
Title Symmetric key based RFID authentication protocol with a secure key-updating scheme
URI https://ieeexplore.ieee.org/document/6567741
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV27bsIwFLUo6tAufUDVtzx0bMDGSWzPKahdEKIMbMiO7YqBgCCp1L-vrwnQSl065a1EzuPee3LOuQg9Ua6czwJAuhX7AgXcW0VqSKSJdsTERnGeh2YTfDgU06kcNdDzXgtjrQ3kM9uB2fAv3yzzCqCyrs89fLbia50jztOtVuuAp_jaJviW7DSRYmsdJYAxx4UMoi4uAbijdOf1VC_3dmoaIrtZ1s_6QPlinfp0v_quhLAzOPvfBZ-j9kG_h0f7yHSBGra4RKc_rAdbaPz-tVhAN60c-9cYQzAzeDx4e8EKOO9FWWN5GIwclv5pwYDYYoU3ANBbOCiqVqCNKD6wr5DtwrbRZNCfZK9R3V8hmktSRsw4x5LUOp1wTRJDtP_4aWFkzjmhQnLFjFLaJdRpqp3yhZ0R1OU9mPpN7Ao1i2VhrxGOBVGWSiuZTePEwK4p88mZ4s7lOo5vUAsGZ7baOmjM6nG5_Xv1HTrphaYTQCu8R81yXdkHdJx_lvPN-jHc9m-Ffqcb
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3LTgIxFG0ImqgbH2B824VLBzrPtusRAhEJQRbsSDttDQsGAoOJf29vGUATN67mnZk0nbn3njnnXISefCqMzQJAuhXZAgXcW1miiCeJNERFSlCauWYTtN9n4zEfVNDzTgujtXbkM92AVfcvX82zNUBlTZt72GzF1joHcRQFZKPW2iMqtrpxziVbVSTbmEcx4MxRxp2si3KA7nx_6_ZUbgdbPQ3hzTRtpS0gfYWN8oa_Oq-4wNM-_d8jn6H6XsGHB7vYdI4qOr9AJz_MB2to-P41m0E_rQzbFxlDOFN42O6-YAGs97wo0TwMVg5zO18wYLZY4BVA9Bou8tYLUEfkH9jWyHqm62jUbo3Sjld2WPCmnBReqIwJ40QbGVNJYkWk_fxJpnhGKfEZpyJUQkgT-0b60ghb2inmmyyApT0UXqJqPs_1FcIRI0L7XPNQJ1Gs4NQktOmZoMZkMoquUQ0GZ7LYeGhMynG5-Xv3IzrqjN56k163_3qLjgPXggJIhneoWizX-h4dZp_FdLV8cFPgG2uWqmI
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2013+26th+IEEE+Canadian+Conference+on+Electrical+and+Computer+Engineering+%28CCECE%29&rft.atitle=Symmetric+key+based+RFID+authentication+protocol+with+a+secure+key-updating+scheme&rft.au=Guangyu+Zhu&rft.au=Khan%2C+Gul+N.&rft.date=2013-05-01&rft.pub=IEEE&rft.isbn=9781479900312&rft.issn=0840-7789&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FCCECE.2013.6567741&rft.externalDocID=6567741
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0840-7789&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0840-7789&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0840-7789&client=summon