Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014 (2014), Article ID 704623, 12 pages
http://dx.doi.org/10.1155/2014/704623
Research Article

A Secure RFID Authentication Protocol Adopting Error Correction Code

1School of Computer Science and Technology, Harbin Institute of Technology Shenzhen Graduate School, Shenzhen 518055, China
2Shenzhen Key Laboratory of Internet Information Collaboration, Shenzhen 518055, China
3Department of Computer Science, National Tsing Hua University, Hsinchu 300, Taiwan

Received 7 February 2014; Accepted 10 March 2014; Published 18 May 2014

Academic Editors: M. Ivanovic and F. Yu

Copyright © 2014 Chien-Ming Chen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. K. Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, John Wiley & Sons, New York, NY, USA, 2003.
  2. R. Das and P. Harrop, “RFID forecasts, players and opportunities 2009–2019,” IDTechEx Report, 2009. View at Google Scholar
  3. D. Ranasinghe, D. Engels, and P. Cole, “Low-cost RFID systems: confronting security and privacy,” in Proceedings of the Auto-ID Labs Research Workshop, pp. 54–77, 2004.
  4. C. M. Chen, Y. H. Lin, Y. H. Chen, and H. M. Sun, “Sashimi: secure aggregation via successively hierarchical inspecting of message integrity on wsn,” Journal of Information Hiding and Multimedia Signal Processing, vol. 4, no. 1, pp. 57–72.
  5. E. K. Wang, Y. Ye, and X. Xu, “Locationbased distributed group key agreement scheme for vehicular ad hoc network,” International Journal of Distributed Sensor Networks, vol. 2014, Article ID 759601, 8 pages, 2014. View at Publisher · View at Google Scholar
  6. W. C. Ku, C. M. Chen, and H. L. Lee, “Cryptanalysis of a variant of peyravian-zunic's password authentication scheme,” IEICE Transactions on Communications, vol. E86-B, no. 5, pp. 1682–1684, 2003. View at Google Scholar · View at Scopus
  7. C. W. Lin, T. P. Hong, C. C. Chang, and S. L. Wang, “A greedy-based approach for hiding sensitive itemsets by transaction insertion,” Journal of Information Hiding and Multimedia Signal Processing, vol. 4, no. 4, pp. 201–227, 2013. View at Google Scholar
  8. C. M. Chen, Y. H. Chen, Y. H. Lin, and H. M. Sun, “Eliminating rouge femtocells based on distance bounding protocol and geographic information,” Expert Systems with Applications, vol. 41, no. 2, pp. 426–433, 2014. View at Google Scholar
  9. B. Z. He, C. M. Chen, Y. P. Su, and H. M. Sun, “A defence scheme against identity theft attack based on multiple social networks,” Expert Systems with Applications, vol. 41, no. 5, pp. 2345–2352, 2014. View at Google Scholar
  10. H. M. Sun, H. Wang, K. H. Wang, and C. M. Chen, “A native APIs protection mechanism in the kernel mode against malicious code,” IEEE Transactions on Computers, vol. 60, no. 6, pp. 813–823, 2011. View at Publisher · View at Google Scholar · View at Scopus
  11. T. Y. Wu and Y. M. Tseng, “Further analysis of pairing-based traitor tracing schemes for broadcast encryption,” Security and Communication Networks, vol. 6, no. 1, pp. 28–32, 2013. View at Google Scholar
  12. C. M. Chen, K. H. Wang, T. Y. Wu, J. S. Pan, and H. M. Sun, “A scalable transitive humanverifiable authentication protocol for mobile devices,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 8, pp. 1318–1330, 2013. View at Google Scholar
  13. M. Conti, R. Di Pietro, L. V. Mancini, and A. Spognardi, “RIPP-FS: An RFID identification, privacy preserving protocol with forward secrecy,” in Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 229–234, March 2007. View at Publisher · View at Google Scholar · View at Scopus
  14. B. Song and C. J. Mitchell, “RFID authentication protocol for low-cost tags,” in Proceedings of the 1st ACM Conference on Wireless Network Security, pp. 140–147, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  15. J. Guajardo, P. Tuyls, N. Bird et al., “RFID security: cryptography and physics perspectives,” RFID Security, pp. 103–130, 2008. View at Google Scholar
  16. P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, “An efficient authentication protocol for RFID systems resistant to active attacks,” in Emerging Directions in Embedded and Ubiquitous Computing, vol. 4809 of Lecture Notes in Computer Science, pp. 781–794, 2007. View at Google Scholar · View at Scopus
  17. M. O'Neill, “Low-cost SHA-1 hash function architecture for RFID tags,” in Proceedings of the International Conference on RFID Security, 2008.
  18. A. Bogdanov, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, and Y. Seurin, “Hash functions and RFID tags: mind the gap,” in Cryptographic Hardware and Embedded Systems—CHES 2008, vol. 5154 of Lecture Notes in Computer Science, pp. 283–299, 2008. View at Publisher · View at Google Scholar · View at Scopus
  19. A. Juels and S. A. Weis, “Authenticating pervasive devices with human protocols,” in Advances in Cryptology—CRYPTO 2005, vol. 3621 of Lecture Notes in Computer Science, pp. 293–308, 2006. View at Google Scholar · View at Scopus
  20. N. Hopper and M. Blum, “Secure human identification protocols,” in Proceedings of the 7th International Conference on Theory and Application of Cryptology and Information Security, pp. 52–66, 2001.
  21. H. Gilbert, M. Robshaw, and H. Sibert, “Active attack against HB+: a provably secure lightweight authentication protocol,” Electronics Letters, vol. 41, no. 21, pp. 1169–1170, 2005. View at Publisher · View at Google Scholar · View at Scopus
  22. J. Bringer, H. Chabanne, and E. Dottax, “HB++: a lightweight authentication protocol secure against some attacks,” in Proceedings of the 2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, pp. 28–33, June 2006. View at Publisher · View at Google Scholar · View at Scopus
  23. J. Munilla and A. Peinado, “HB-MP: a further step in the HB-family of lightweight authentication protocols,” Computer Networks, vol. 51, no. 9, pp. 2262–2267, 2007. View at Publisher · View at Google Scholar · View at Scopus
  24. H. Gilbert, M. Robshaw, and Y. Seurin, “HB#: increasing the security and efficiency of HB+,” in Proceedings of the 27th International Conference on Theory and Applications of Cryptographic Techniques, pp. 361–378, 2008.
  25. “EPCglobal,” http://www.epcglobalinc.org.
  26. H. M. Sun and W. C. Ting, “A Gen2-based RFID authentication protocol for security and privacy,” IEEE Transactions on Mobile Computing, vol. 8, no. 8, pp. 1052–1062, 2009. View at Publisher · View at Google Scholar · View at Scopus
  27. M. Burmester, B. de Medeiros, J. Munilla, and A. Peinado, “Secure EPC Gen2 compliant radio frequency identification,” Ad-Hoc, Mobile and Wireless Networks, vol. 5793, pp. 227–240, 2009. View at Publisher · View at Google Scholar · View at Scopus
  28. Identification Cards—Contactless Integrated Circuit Cards—Proximity Cards, ISO, 14443 Std.
  29. H. Y. Chien, “SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity,” IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 4, pp. 337–340, 2007. View at Publisher · View at Google Scholar · View at Scopus
  30. H. Y. Chien and C. S. Laih, “ECC-based lightweight authentication protocol with untraceability for low-cost RFID,” Journal of Parallel and Distributed Computing, vol. 69, no. 10, pp. 848–853, 2009. View at Publisher · View at Google Scholar · View at Scopus
  31. H. M. Sun, W. C. Ting, and K. H. Wang, “On the security of Chien's ultralightweight RFID authentication protocol,” IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 2, pp. 315–317, 2011. View at Publisher · View at Google Scholar · View at Scopus
  32. R. W. Phan, “Cryptanalysis of a new ultralightweight RFID authentication protocolSASI,” IEEE Transactions on Dependable and Secure Computing, vol. 6, no. 4, pp. 316–320, 2009. View at Publisher · View at Google Scholar · View at Scopus
  33. C. -M. Chen, S. -M. Chen, X. Zheng, L. Yan, H. Wang, and H. -M. Sun, “Pitfalls in an ECC-based lightweight authentication protocol for low-cost RFID,” Journal of Information Hiding and Multimedia Signal Processing, vol. 5, no. 4, 2014. View at Google Scholar
  34. S. Qasim, A. Telba, and A. AlMazroo, “FPGA design and implementation of matrix multiplier architectures for image and signal processing applications,” International Journal of Computer Science and Network Security, vol. 10, no. 2, pp. 168–176, 2010. View at Google Scholar