An Enhanced Biometric Based RFID Authentication Scheme Defending Against Illegitimate Access

Umar Ayaz, Tayyaba Abdul Haq, Saba Taimour, Khwaja Mansoor, Saba Mahmood
{"title":"An Enhanced Biometric Based RFID Authentication Scheme Defending Against Illegitimate Access","authors":"Umar Ayaz, Tayyaba Abdul Haq, Saba Taimour, Khwaja Mansoor, Saba Mahmood","doi":"10.1109/ICET.2018.8603650","DOIUrl":null,"url":null,"abstract":"Radio-frequency-identification (RFID) technology has been widely used to identify the RFID-Tags associated with objects through RFID-Reader using electromagnetic signals. The rapid growth of RFID technology is also accompanied by contemporary security challenges and threats. The highly secure authentication protocol is obligatory to overcome security challenges. Recently Srivastava et al. have proposed a Hash-biometric based authentication protocol for RFID Systems to resist the security threats. However, this study points out that Srivastava et al. scheme is vulnerable to 1) Possible Stolen Verifier Attack 2) Anonymity and Traceability Issue 3) Impersonation Attack by illegitimate user 4) Insider Attack. An enhanced and efficient protocol is presented in this paper for RFID Systems based on biometric authentication to handle security challenges and attacks found in Srivastava et al. scheme. The proposed protocol is formally tested and verified through well-known security automated tool (ProVerif). The proposed protocol is adequately secure and has a preferable efficiency in contrast to the other existing schemes.","PeriodicalId":443353,"journal":{"name":"2018 14th International Conference on Emerging Technologies (ICET)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 14th International Conference on Emerging Technologies (ICET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICET.2018.8603650","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Radio-frequency-identification (RFID) technology has been widely used to identify the RFID-Tags associated with objects through RFID-Reader using electromagnetic signals. The rapid growth of RFID technology is also accompanied by contemporary security challenges and threats. The highly secure authentication protocol is obligatory to overcome security challenges. Recently Srivastava et al. have proposed a Hash-biometric based authentication protocol for RFID Systems to resist the security threats. However, this study points out that Srivastava et al. scheme is vulnerable to 1) Possible Stolen Verifier Attack 2) Anonymity and Traceability Issue 3) Impersonation Attack by illegitimate user 4) Insider Attack. An enhanced and efficient protocol is presented in this paper for RFID Systems based on biometric authentication to handle security challenges and attacks found in Srivastava et al. scheme. The proposed protocol is formally tested and verified through well-known security automated tool (ProVerif). The proposed protocol is adequately secure and has a preferable efficiency in contrast to the other existing schemes.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种增强的基于生物特征的RFID认证方案,防止非法访问
射频识别(RFID)技术已被广泛应用于通过RFID阅读器利用电磁信号识别与物体相关联的RFID标签。RFID技术的快速发展也伴随着当代的安全挑战和威胁。高度安全的身份验证协议是克服安全挑战的必要条件。最近,Srivastava等人提出了一种基于哈希生物识别的RFID系统认证协议,以抵御安全威胁。然而,本研究指出Srivastava等人的方案容易受到1)可能被盗的验证者攻击2)匿名性和可追溯性问题3)非法用户的冒充攻击4)内部攻击。本文提出了一种基于生物识别认证的RFID系统增强和高效协议,以处理Srivastava等方案中发现的安全挑战和攻击。提出的协议通过知名的安全自动化工具(ProVerif)进行了正式的测试和验证。与其他现有方案相比,所提出的协议具有足够的安全性和更高的效率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Semantic Analysis of News Based on the Deep Convolution Neural Network Identification and mapping of coral reefs using Landsat 8 OLI in Astola Island, Pakistan coastal ocean Robot Localization in Indoor and Outdoor Environments by Multi-sensor Fusion Understanding Worker Mobility within the Stay Locations using HMMs on Semantic Trajectories Domain Specific Emotion Lexicon Expansion
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1