Umar Ayaz, Tayyaba Abdul Haq, Saba Taimour, Khwaja Mansoor, Saba Mahmood
{"title":"一种增强的基于生物特征的RFID认证方案,防止非法访问","authors":"Umar Ayaz, Tayyaba Abdul Haq, Saba Taimour, Khwaja Mansoor, Saba Mahmood","doi":"10.1109/ICET.2018.8603650","DOIUrl":null,"url":null,"abstract":"Radio-frequency-identification (RFID) technology has been widely used to identify the RFID-Tags associated with objects through RFID-Reader using electromagnetic signals. The rapid growth of RFID technology is also accompanied by contemporary security challenges and threats. The highly secure authentication protocol is obligatory to overcome security challenges. Recently Srivastava et al. have proposed a Hash-biometric based authentication protocol for RFID Systems to resist the security threats. However, this study points out that Srivastava et al. scheme is vulnerable to 1) Possible Stolen Verifier Attack 2) Anonymity and Traceability Issue 3) Impersonation Attack by illegitimate user 4) Insider Attack. An enhanced and efficient protocol is presented in this paper for RFID Systems based on biometric authentication to handle security challenges and attacks found in Srivastava et al. scheme. The proposed protocol is formally tested and verified through well-known security automated tool (ProVerif). The proposed protocol is adequately secure and has a preferable efficiency in contrast to the other existing schemes.","PeriodicalId":443353,"journal":{"name":"2018 14th International Conference on Emerging Technologies (ICET)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"An Enhanced Biometric Based RFID Authentication Scheme Defending Against Illegitimate Access\",\"authors\":\"Umar Ayaz, Tayyaba Abdul Haq, Saba Taimour, Khwaja Mansoor, Saba Mahmood\",\"doi\":\"10.1109/ICET.2018.8603650\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Radio-frequency-identification (RFID) technology has been widely used to identify the RFID-Tags associated with objects through RFID-Reader using electromagnetic signals. The rapid growth of RFID technology is also accompanied by contemporary security challenges and threats. The highly secure authentication protocol is obligatory to overcome security challenges. Recently Srivastava et al. have proposed a Hash-biometric based authentication protocol for RFID Systems to resist the security threats. However, this study points out that Srivastava et al. scheme is vulnerable to 1) Possible Stolen Verifier Attack 2) Anonymity and Traceability Issue 3) Impersonation Attack by illegitimate user 4) Insider Attack. An enhanced and efficient protocol is presented in this paper for RFID Systems based on biometric authentication to handle security challenges and attacks found in Srivastava et al. scheme. The proposed protocol is formally tested and verified through well-known security automated tool (ProVerif). The proposed protocol is adequately secure and has a preferable efficiency in contrast to the other existing schemes.\",\"PeriodicalId\":443353,\"journal\":{\"name\":\"2018 14th International Conference on Emerging Technologies (ICET)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 14th International Conference on Emerging Technologies (ICET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICET.2018.8603650\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 14th International Conference on Emerging Technologies (ICET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICET.2018.8603650","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Enhanced Biometric Based RFID Authentication Scheme Defending Against Illegitimate Access
Radio-frequency-identification (RFID) technology has been widely used to identify the RFID-Tags associated with objects through RFID-Reader using electromagnetic signals. The rapid growth of RFID technology is also accompanied by contemporary security challenges and threats. The highly secure authentication protocol is obligatory to overcome security challenges. Recently Srivastava et al. have proposed a Hash-biometric based authentication protocol for RFID Systems to resist the security threats. However, this study points out that Srivastava et al. scheme is vulnerable to 1) Possible Stolen Verifier Attack 2) Anonymity and Traceability Issue 3) Impersonation Attack by illegitimate user 4) Insider Attack. An enhanced and efficient protocol is presented in this paper for RFID Systems based on biometric authentication to handle security challenges and attacks found in Srivastava et al. scheme. The proposed protocol is formally tested and verified through well-known security automated tool (ProVerif). The proposed protocol is adequately secure and has a preferable efficiency in contrast to the other existing schemes.