International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II

Research Article

RFID Authentication Protocol Resistant to the Man-in-the-Middle Attack

Download
198 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-23802-9_6,
        author={Li Zhai and ChuanKun Wu},
        title={RFID Authentication Protocol Resistant to the Man-in-the-Middle Attack},
        proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II},
        proceedings_a={SECURECOMM},
        year={2015},
        month={12},
        keywords={RFID Man-in-the-middle attack Privacy Internet of Things},
        doi={10.1007/978-3-319-23802-9_6}
    }
    
  • Li Zhai
    ChuanKun Wu
    Year: 2015
    RFID Authentication Protocol Resistant to the Man-in-the-Middle Attack
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-23802-9_6
Li Zhai,*, ChuanKun Wu1,*
  • 1: Chinese Academy of Sciences
*Contact email: zhaili@iie.ac.cn, ckwu@iie.ac.cn

Abstract

HB+ family protocols that based on LPN problem are effective and well suited for the Internet of Things. However, the HB+ family protocols have vulnerability on the man-in-the-middle attack. In this paper, we propose a new privacy preserving RFID authentication protocol based on the multiplication on . By analyzing the differential property on , we show that the protocol is resistant to the man-in-the-middle attack. Moreover, the performance analysis shows the protocol meets the demands of the large-scale RFID systems.