Research Article
RFID Authentication Protocol Resistant to the Man-in-the-Middle Attack
198 downloads
@INPROCEEDINGS{10.1007/978-3-319-23802-9_6, author={Li Zhai and ChuanKun Wu}, title={RFID Authentication Protocol Resistant to the Man-in-the-Middle Attack}, proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II}, proceedings_a={SECURECOMM}, year={2015}, month={12}, keywords={RFID Man-in-the-middle attack Privacy Internet of Things}, doi={10.1007/978-3-319-23802-9_6} }
- Li Zhai
ChuanKun Wu
Year: 2015
RFID Authentication Protocol Resistant to the Man-in-the-Middle Attack
SECURECOMM
Springer
DOI: 10.1007/978-3-319-23802-9_6
Abstract
HB+ family protocols that based on LPN problem are effective and well suited for the Internet of Things. However, the HB+ family protocols have vulnerability on the man-in-the-middle attack. In this paper, we propose a new privacy preserving RFID authentication protocol based on the multiplication on . By analyzing the differential property on , we show that the protocol is resistant to the man-in-the-middle attack. Moreover, the performance analysis shows the protocol meets the demands of the large-scale RFID systems.
Copyright © 2014–2024 ICST