An Improved RFID Authentication Protocol with Privacy Protection Based on Chaotic Maps

Hongfeng Zhu,
Yan Zhang,

Abstract


Considering the convenience of reusability and identifiability of Radio frequency identification (RFID) technology, increasingly industries tend to use these properties, such as in the area of transportation, logistics, medical treatment, military, and so on. Many researchers have proposed RFID authentication protocols that conform to the EPCglobal Class 1 Generation 2 (EPC C1-G2) standard. Recently, Akgun et al. have proposed an RFID authentication protocol which utilized the  Chebyshev chaotic map hard problem to realize flexibility RFID application. However, we point out three security flaws in their protocol. Firstly, we find that their protocol lack of RFID tag verification. Secondly, the protocol is vulnerable to tag impersonation attack and de-synchronization attack. Therefore, in this paper, we propose an improved RFID authentication protocol based on chaotic maps hard problem. Our protocol has the feature of privacy protection and robust to many malicious attacks. Moreover, the protocol also enhances the security of the RFID system.


Citation Format:
Hongfeng Zhu, Yan Zhang, "An Improved RFID Authentication Protocol with Privacy Protection Based on Chaotic Maps," Journal of Internet Technology, vol. 19, no. 6 , pp. 1777-1787, Nov. 2018.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.





Published by Executive Committee, Taiwan Academic Network, Ministry of Education, Taipei, Taiwan, R.O.C
JIT Editorial Office, Office of Library and Information Services, National Dong Hwa University
No. 1, Sec. 2, Da Hsueh Rd., Shoufeng, Hualien 974301, Taiwan, R.O.C.
Tel: +886-3-931-7314  E-mail: jit.editorial@gmail.com