Symmetric key based RFID authentication protocol with a secure key-updating scheme
RFID technology is being widely employed in various pervasive applications. Therefore, security and privacy protection for RFID systems is an important issue that needs to be addressed. In this paper, we present a secure mutual authentication protocol for RFID systems that is based on symmetric key...
Uloženo v:
| Vydáno v: | 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) s. 1 - 5 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
01.05.2013
|
| Témata: | |
| ISBN: | 9781479900312, 1479900311 |
| ISSN: | 0840-7789 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | RFID technology is being widely employed in various pervasive applications. Therefore, security and privacy protection for RFID systems is an important issue that needs to be addressed. In this paper, we present a secure mutual authentication protocol for RFID systems that is based on symmetric key technique with an efficient key updating mechanism. The objective is to improve the RFID system security against replay, de-synchronization, eavesdropping and man-in-the-middle attacks while maintaining lower computation, communication and storage. We also compare our authentication method with three recent protocols that deploy the same block cipher (XTEA) by implementing all the protocols on the same RF based hardware. Our proposed authentication protocol provides high security level and low computation and communication costs. |
|---|---|
| AbstractList | RFID technology is being widely employed in various pervasive applications. Therefore, security and privacy protection for RFID systems is an important issue that needs to be addressed. In this paper, we present a secure mutual authentication protocol for RFID systems that is based on symmetric key technique with an efficient key updating mechanism. The objective is to improve the RFID system security against replay, de-synchronization, eavesdropping and man-in-the-middle attacks while maintaining lower computation, communication and storage. We also compare our authentication method with three recent protocols that deploy the same block cipher (XTEA) by implementing all the protocols on the same RF based hardware. Our proposed authentication protocol provides high security level and low computation and communication costs. |
| Author | Guangyu Zhu Khan, Gul N. |
| Author_xml | – sequence: 1 surname: Guangyu Zhu fullname: Guangyu Zhu organization: Dept. of Electr. & Comput. Eng., Ryerson Univ., Toronto, ON, Canada – sequence: 2 givenname: Gul N. surname: Khan fullname: Khan, Gul N. organization: Dept. of Electr. & Comput. Eng., Ryerson Univ., Toronto, ON, Canada |
| BookMark | eNpVkMtOwkAYhceIiYC8gG7mBYr_dNrOzNLUoiQkJsiezOUfO0pb0g4xvD0Q2bj6cnIuizMho7ZrkZBHBnPGQD2XZVVW8xQYnxd5IUTGbshMCckyoRQA58XtP83SERmDzCARQqp7MhmGbwDIZJGNyfrz2DQY-2DpDx6p0QM6ul4sX6k-xBrbGKyOoWvpvu9iZ7sd_Q2xppoOaA89XkrJYe_OmfaLDrbGBh_Inde7AWdXTslmUW3K92T18bYsX1ZJUBAT7rzneYHe5MJA7sDkXBrplBUCmFRCc6e18TnzhhmvFRNOMm_TC88Wn5Knv9mAiNt9HxrdH7fXR_gJsf9VqA |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1109/CCECE.2013.6567741 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library (IEL) (UW System Shared) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 9781479900336 1479900338 147990032X 9781479900329 |
| EndPage | 5 |
| ExternalDocumentID | 6567741 |
| Genre | orig-research |
| GroupedDBID | 29F 6IE 6IF 6IH 6IK 6IL 6IM 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IJVOP IPLJI M43 OCL RIE RIL RIO RNS |
| ID | FETCH-LOGICAL-i90t-3dff356efb57b05d0b538b8d9c7701897a3daabf51fb1bfa917d81fc217d83da3 |
| IEDL.DBID | RIE |
| ISBN | 9781479900312 1479900311 |
| ISSN | 0840-7789 |
| IngestDate | Wed Aug 27 04:12:20 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i90t-3dff356efb57b05d0b538b8d9c7701897a3daabf51fb1bfa917d81fc217d83da3 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_6567741 |
| PublicationCentury | 2000 |
| PublicationDate | 2013-May |
| PublicationDateYYYYMMDD | 2013-05-01 |
| PublicationDate_xml | – month: 05 year: 2013 text: 2013-May |
| PublicationDecade | 2010 |
| PublicationTitle | 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) |
| PublicationTitleAbbrev | CCECE |
| PublicationYear | 2013 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0004864 ssj0001106840 |
| Score | 1.5282623 |
| Snippet | RFID technology is being widely employed in various pervasive applications. Therefore, security and privacy protection for RFID systems is an important issue... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Authentication Ciphers mutual authentication privacy protection Protocols Radiofrequency identification RFID Servers symmetric key algorithm |
| Title | Symmetric key based RFID authentication protocol with a secure key-updating scheme |
| URI | https://ieeexplore.ieee.org/document/6567741 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT8IwGG6QeNCLH2D8Tg8eHazrRtvzhGhiCEFiuJF-Gg4MAsPEf2_fMkATL572lWVbt7bv8-x9nhehB6VoSg1LosQoGaWW0kg6ayOnfDzh4UcqAzXw_sr6fT4ei0ENPe60MNbakHxmW7Aa_uWbuV4DVdb2sYePVjzWOWCss9Fq7fkUj22Cb8lWE8k31lEcMuYYF0HUxQQQd4RsvZ6q7WSrpolFO8-7eRdSvmirutyvuith2umd_O-GT1Fzr9_Dg93MdIZqtjhHxz-sBxto-PY1m0E1LY19N8YwmRk87L08YQk570VZcXkYjBzm_mvBwNhiiVdA0Fs4KVovQBtRfGCPkO3MNtGo1x3lz1FVXyGairiMqHGOZh3rVMZUnJlY-cFPcSM0YzHhgklqpFQuI04R5aQHdoYTpxNY-kP0AtWLeWEvEdYp848qfN_PXMr9IBAzaURCNOl4hK30FWpA40wWGweNSdUu13_vvkFHSSg6AWmFt6heLtf2Dh3qz3K6Wt6H1_4N4OmnHQ |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JTwIxGG0ImqgXFzDu9uDRwnQ6Q9vzCIGIhCAx3EhXw4GBsJj4723LIJp48TRbJjPTtP363nzvfQA8SEkSommMYi0FSgwhSFhjkJVuPeHgRyICNfDWpb0eG414vwQev7UwxpiQfGZqfjf8y9cztfZUWd2tPdxqxWGdvTRJ4mij1toxKg7dBOeSrSqSbcyjmM-Zo4wHWRflnrrDeOv2VBzHWz1NxOtZ1syaPumL1IoH_qq8EgJP6_h_r3wCqjsFH-x_x6ZTUDL5GTj6YT5YAYPXz-nU19NS0A1k6MOZhoNW5wkKn_Werwo2D3orh5nrL9BztlDApafojb8JredeHZG_Q4eRzdRUwbDVHGZtVFRYQBMerRDR1pK0YaxMqYxSHUk3_UmmuaI0woxTQbQQ0qbYSiytcNBOM2xV7LfuEjkH5XyWmwsAVULdp3I3-lObMDcNRFRoHmOFGw5jS3UJKr5xxvONh8a4aJerv0_fg4P28KU77nZ6z9fgMA4lKHyS4Q0orxZrcwv21cdqslzchS7wBchxqmQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2013+26th+IEEE+Canadian+Conference+on+Electrical+and+Computer+Engineering+%28CCECE%29&rft.atitle=Symmetric+key+based+RFID+authentication+protocol+with+a+secure+key-updating+scheme&rft.au=Guangyu+Zhu&rft.au=Khan%2C+Gul+N.&rft.date=2013-05-01&rft.pub=IEEE&rft.isbn=9781479900312&rft.issn=0840-7789&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FCCECE.2013.6567741&rft.externalDocID=6567741 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0840-7789&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0840-7789&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0840-7789&client=summon |

