International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us

IJSTR >> Volume 3- Issue 5, May 2014 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

A Secured Mutual Authentication Protocol For RFID System

[Full Text]



Rajarshi Roy Chowdhury, Md. Abdul Awal Ansary



Index Terms: RFID, Mutual Authentication, Model, Security, Wireless communication, Tag and Timestamp.



Abstract: Contactless automatic RFID system is intended to replace existing barcode scheme, since it has the capability of reading huge amount of data from many tags simultaneously in a respective range. Whereas, an RFID system is consist of a database server connected with many readers through wired communication and readers to tags are mostly wireless communication. This wireless connection in between tags and readers are vulnerable by an adversary in many ways. However, there are some common problems in RFID system such as: location tracking, bogus request, indistinguishability, spoofing and forward security. In this paper, we proposed a protocol based on the timestamp and tag’s generated random number to overcome such security issues. An additional parameter to use in a tag (random number) will increase some security strength compared to the previous scheme; even though slightly raise processing power in the tag. The anticipated protocol is the extended version of the existing protocol proposed by Cho C., H., Do, K.,H., Kim, J.,W., and Jun, M.,S. in Dec 2009.



[1] Ants' home search habit uncovered, [Link: http://news.bbc.co.uk/2/hi/uk_news/england/bristol/somerset/8011998.stm].

[2] Miles, Stephen Bell. RFID Technology and Applications. London: Cambridge University Press. pp. 6–8, 2011.

[3] High Tech Aid. [Link: http://www.hightechaid.com/tech/rfid/rfid_technology.htm].

[4] J.S. Cho, S.S. Yeo, S.K. Kim, Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value, Computer Communications, pp.391-397, March 2010.

[5] Technovelgy.com - where science meets fiction, [Link: http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=20].

[6] Dimitriou, T., A Lightweight RFID Protocol to protect against Traceability and Cloning attacks, Security and Privacy for Emerging Areas in Communications Networks -SecureComm 05, pp. 59 - 66, September 2005.

[7] NEOCATENA NETWORKS INC. (Next genaration RFID Security) [Link: http://neocatena.com/technology/risks/].

[8] Cho C.,H., Do, K.,H., Kim, J.,W., and Jun, M.,S., Design of RFID Mutual Authentication Protocol using Time Stamp, 4th International conference on computer sciences and convergence information technology, December 2009.