RMIT University
Browse

Secure RFID identification and authentication with triggered hash chain variants

conference contribution
posted on 2024-10-31, 17:05 authored by Tong-Lee Lim, Tieyan Li, Tao Gu
In this paper, we propose two RFID identification and authentication schemes based on the previously proposed Triggered Hash Chain scheme by Henrici and Muller [1]. The schemes are designed to mitigate the shortcomings observed in the Triggered Hash Chain scheme and to ensure privacypreserving identification, tag-reader mutual authentication, as well as forward-privacy in the case of RFID tags that have been compromised. The first scheme uses a challenge-response mechanism to defend against an obvious weakness of the Triggered Hash Chain scheme. The second scheme uses an authenticated monotonic counter to defend against a session linking attack that the first scheme is vulnerable to. We compare the level of security offered by our proposed schemes against other previous schemes and find that the schemes perform well, while keeping within reasonable overheads in terms of computational, storage and communication requirements.

History

Related Materials

  1. 1.
    DOI - Is published in 10.1109/ICPADS.2008.46
  2. 2.
    ISSN - Is published in 15219097

Start page

583

End page

590

Total pages

8

Outlet

Proceedings of the 14th IEEE International Conference on Parallel and Distributed Systems

Editors

Michael Hobbs, Yang Xiang, Wanlei Zhou

Name of conference

ICPADS 2008

Publisher

IEEE

Place published

Alamitos, CA, USA

Start date

2008-12-08

End date

2008-12-10

Language

English

Copyright

© 2008 IEEE

Former Identifier

2006040041

Esploro creation date

2020-06-22

Fedora creation date

2015-01-15

Usage metrics

    Scholarly Works

    Keywords

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC