Security Analysis and Improvement of Wei-Chi Ku and Yi-Han Chen’s RFID protocol

Authors

  • MohammadReza Mehrabani * Department of Electrical Engineering, Iran University of science and Technology, Tehran, Iran
  • Soosan Sadegha Pharmacy faculty, Tehran university of medical science, Tehran, Iran

DOI:

https://doi.org/10.52547/ijie.1.2.73

DOR:

https://dorl.net/dor/20.1001.1.27831906.2021.1.2.6.0

Keywords:

Radio frequency identification (RFID), security, privacy, authentication, confidentiality

Abstract

RFID are small wireless devices that can be used for identification of objects and humans. With development of RFID technology and increasing the use of this technology in everyday life, the Security issues in these systems have been growing in terms of importance day by day. In 2012 Wei-Chi Ku and Yi-Han Chen Proposed a new efficient mutual authentication protocol for passive RFID that provides confidentiality, un-traceability and efficiency. This paper demonstrates that Wei-Chi Ku and Yi-Han Chen’s protocol has a serious security problem and proposes a new protocol to prevent this security problem by some changes. Furthermore, the capability of our method for improving, confidentiality, untraceability, and data integrity is discussed.

Downloads

Download data is not yet available.

References

• Aghili, S. F., Ashouri-Talouki, M., & Mala, H. (2018). DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT. The Journal of Supercomputing, 74(1), 509-525. doi: https://doi.org/10.1007/s11227-017-2139-y

• Cole, P. H., & Ranasinghe, D. C. (2008). Networked RFID systems and lightweight cryptography. London, UK: Springer. Doi: https://doi.org/10.1007/978-3-540-71641-9

• Habibi, M. H., & Aref, M. R. (2015). Attacks on recent RFID authentication protocols. Journal of Signal Processing Systems, 79(3), 271-283.‏ doi: https://doi.org/10.1007/s11265-013-0844-1

• Ku, W. C., & Chen, Y. H. (2012, August). Improvement of EPC-C1G2 RFID authentication protocols. In 2012 1st IEEE International Conference on Communications in China (ICCC) (pp. 226-230). IEEE.‏ doi: https://doi.org/10.1109/ICCChina.2012.6356882

• Lo, N. W., & Yeh, K. H. (2010, October). De-synchronization attack on RFID authentication protocols. In 2010 International symposium on information theory & its applications (pp. 566-570). IEEE. Doi: https://doi.org/10.1109/ISITA.2010.5649726

• Phan, R. C. W., Wu, J., Ouafi, K., & Stinson, D. R. (2011). Privacy analysis of forward and backward untraceable RFID authentication schemes. Wireless Personal Communications, 61(1), 69-81. Doi: https://doi.org/10.1007/s11277-010-0001-0

• Rizomiliotis, P., Rekleitis, E., & Gritzalis, S. (2009). Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags. IEEE Communications Letters, 13(4), 274-276. Doi: https://doi.org/10.1109/LCOMM.2009.082117

• Shi, Z., Chen, J., Chen, S., & Ren, S. (2017, March). A lightweight RFID authentication protocol with confidentiality and anonymity. In 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC) (pp. 1631-1634). IEEE. Doi: https://doi.org/10.1109/IAEAC.2017.8054290

• Song, B., & Mitchell, C. J. (2008, March). RFID authentication protocol for low-cost tags. In Proceedings of the first ACM conference on Wireless network security (pp. 140-147). Doi: https://doi.org/10.1145/1352533.1352556

• Su, W., Alchazidis, N., & Ha, T. T. (2007, October). Data Integrity in RFID Systems. In MILCOM 2007-IEEE Military Communications Conference (pp. 1-7). IEEE. Doi: https://doi.org/10.1109/MILCOM.2007.4455274

• Van Deursen, T., & Radomirović, S. (2009). Attacks on RFID protocols. Cryptology ePrint Archive, 2008(310), 1-56.‏

• Yeh, T. C., Wu, C. H., & Tseng, Y. M. (2011). Improvement of the RFID authentication scheme based on quadratic residues. Computer Communications, 34(3), 337-341. Doi: https://doi.org/10.1016/j.comcom.2010.05.011

• Yi, X., Wang, L., Mao, D., & Zhan, Y. (2012). An gen2 based security authentication protocol for RFID system. Physics Procedia, 24, 1385-1391. Doi: https://doi.org/10.1016/j.phpro.2012.02.206

• Zuo, Y. (2010). Survivable RFID systems: Issues, challenges, and techniques. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 40(4), 406-418.‏ doi: https://doi.org/10.1109/TSMCC.2010.2043949

Downloads

Published

2021-07-06

How to Cite

Mehrabani, M., & Sadegha, S. (2021). Security Analysis and Improvement of Wei-Chi Ku and Yi-Han Chen’s RFID protocol . International Journal of Innovation in Engineering, 1(2), 73–83. https://doi.org/10.52547/ijie.1.2.73

Issue

Section

Original Research