Visible to the public An Effencient Improvement of RFID Authentication Protocol Using Hash Function ZKP

TitleAn Effencient Improvement of RFID Authentication Protocol Using Hash Function ZKP
Publication TypeConference Paper
Year of Publication2019
AuthorsAl-Adhami, Ayad H., Ambroze, Marcel, Stengel, Ingo, Tomlinson, Martin
Conference Name2019 2nd Scientific Conference of Computer Sciences (SCCS)
Date Publishedmar
Keywordscryptographic protocols, data privacy, elliptical curve cryptographic solutions, Elliptical Curve Cryptography, Hash Function, Hash function ZKP, Human Behavior, Keccak hash function, man-in-the-middle attack, MITM, object detection, privacy attacks, privacy protection, pubcrawl, public key cryptography, radio frequency identification technology, radiofrequency identification, Resiliency, RFID authentication, RFID authentication protocol, RFID privacy, RFID security, RFID system, RFID technology, RFIDs, Schnorr identification protocol
AbstractThe applications of Radio Frequency Identification (RFID) technology has been rapidly developed to be used in different fields that require automatic identification of objects and managing information. The advantage of employing RFID systems is to facilitate automatic identification of objects from distance without any interaction with tagged objects and without using a line of sight as compared with barcode. However, security and privacy constitute a challenge to RFID system as RFID systems use the wireless communication. Many researchers have introduced elliptical curve cryptographic (ECC) solutions to the security and privacy in RFID system as an ideal cryptosystem to be implemented with RFID technology. However, most of these solutions do not have provide adequate protection. Moreover, in terms of integrity and confidentiality level, most of these authentication protocols still vulnerable to some of security and privacy attacks. Based on these facts, this paper proposes a mutual authentication protocol that aims at enhancing an existing RFID authentication protocol that suffers from tracking attack and man-in-the-middle attack (MITM). The enhancement is accomplished by improving the security and privacy level against MITM, tracking attack and other related attacks. The proposed protocol is dependent on use the elliptical curve version of Schnorr identification protocol in combination with Keccak hash function. This combination leads to enhance the confidentiality and integrity level of the RFID authentication system and increase the privacy protection.
Citation Keyal-adhami_effencient_2019