{"title":"Improvement of quadratic residues based scheme for authentication and privacy in mobile RFID","authors":"Y. Azimi, J. Bagherzadeh","doi":"10.1109/IKT.2015.7288808","DOIUrl":null,"url":null,"abstract":"The way of transmitting data untouched through radio-frequency of magnetic fields done through wireless, is called RFID (Radio-frequency identification). The purpose of this method is auto identification of objects through tags attached to them. RFID system is created to ease data transfer about objects. An economic transfer was one of early goals of RFID systems, and this useful technology has entered other sectors of industry as well. Yet main concern in RFID systems is security and privacy. So far many protocols have been proposed to authenticate tags and readers but most of them are vulnerable. In year 2013, R. Doss et al. presented a low-weight protocol based on quadratic residues which provides secure channels between tag-reader and reader-server. In this paper we show that this protocol is vulnerable to replay attack and reader impersonation, and an attacker can authenticate itself to server as a legal tag or legal reader. So in this paper an improvement of this protocol is presented that is resistant to these attacks. Moreover, the proposed method has high speed and performance to do modular operations, because of the use of Montgo mery method.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 7th Conference on Information and Knowledge Technology (IKT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IKT.2015.7288808","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The way of transmitting data untouched through radio-frequency of magnetic fields done through wireless, is called RFID (Radio-frequency identification). The purpose of this method is auto identification of objects through tags attached to them. RFID system is created to ease data transfer about objects. An economic transfer was one of early goals of RFID systems, and this useful technology has entered other sectors of industry as well. Yet main concern in RFID systems is security and privacy. So far many protocols have been proposed to authenticate tags and readers but most of them are vulnerable. In year 2013, R. Doss et al. presented a low-weight protocol based on quadratic residues which provides secure channels between tag-reader and reader-server. In this paper we show that this protocol is vulnerable to replay attack and reader impersonation, and an attacker can authenticate itself to server as a legal tag or legal reader. So in this paper an improvement of this protocol is presented that is resistant to these attacks. Moreover, the proposed method has high speed and performance to do modular operations, because of the use of Montgo mery method.