{"title":"Authentication Protocol of RFID System Based on Security Policy","authors":"Guichao Wang, Yan Wang, Yongzhen Li","doi":"10.1109/IMCCC.2013.276","DOIUrl":null,"url":null,"abstract":"In this paper, we analyzed security and privacy problems of the current low-cost RFID system, and proposed a new RFID authentication protocol based on security policy. This protocol used these methods like setting tag information permissions according to fields and assigning tags with different privacy levels to prevent the authorized tag`s unauthorized information leakage and protected the user's privacy more effectively. Selective one-way/two-way authentication and interested in information transfer mechanism, which can reduce the communication capacity in the whole process of protocol significantly, enable the certification process more flexible, more specific privacy protection, At the same time, tag can reduce the tag hardware requirements by using XOR operation measures which. The security and energy consumption analysis in this paper proved that this protocol can not only protect the authorized tag`s unauthorized information security more flexible, but also reduce the system hardware requirements and communication volume. Compared with the traditional security authentication protocols, this new protocol is more suitable for low-cost RFID system.","PeriodicalId":360796,"journal":{"name":"2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"6 1-2","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMCCC.2013.276","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
In this paper, we analyzed security and privacy problems of the current low-cost RFID system, and proposed a new RFID authentication protocol based on security policy. This protocol used these methods like setting tag information permissions according to fields and assigning tags with different privacy levels to prevent the authorized tag`s unauthorized information leakage and protected the user's privacy more effectively. Selective one-way/two-way authentication and interested in information transfer mechanism, which can reduce the communication capacity in the whole process of protocol significantly, enable the certification process more flexible, more specific privacy protection, At the same time, tag can reduce the tag hardware requirements by using XOR operation measures which. The security and energy consumption analysis in this paper proved that this protocol can not only protect the authorized tag`s unauthorized information security more flexible, but also reduce the system hardware requirements and communication volume. Compared with the traditional security authentication protocols, this new protocol is more suitable for low-cost RFID system.