An Effective Ultralightweight RFID Secure Protocol with Mutual Authentication

Article Preview

Abstract:

Due to the radio transmission nature of RFID, the challenge of security and privacy has seriously hindered the large-scale development of RFID technology. However, low-cost RFID tags have the characteristic of extremely limited resources, traditional security primitives cannot be better applied in RFID system. Hence, Designing an effective ultralightweight security protocol applying to low-cost tag is crucial for the various applications of RFID system. In this paper, we propose an ultralightweight secure protocol with mutual authentication. Without adopting classical cryptographic primitives, the protocol proposed only employs simple bit-wise operations such as xor and module addition. Meanwhile, the protocol can resist various attacks and has features of low computation cost and communication traffic.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1966-1971

Citation:

Online since:

January 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Mitrokotsa, A., M. R. Rieback, A. S. Tanenbaum. Classification of RFID Attacks. INSTICC Press, Portugal. (2008): 73-86.

Google Scholar

[2] H.-Y. Chien. SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity, IEEE Trans. Dependable and Secure Computing. Vol. 4 (2007), pp.337-340.

DOI: 10.1109/tdsc.2007.70226

Google Scholar

[3] P. Peris-Lopez, J. C. Hernandez-Castro. LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. Hand of Workshop on RFID and Lightweight Crypto (2006).

DOI: 10.1201/9781420068405.ch6

Google Scholar

[4] P. Peris-Lopez, J.C. Hernandez-Castro. EMAP: An Efficient Mutual Authentication Protocol for Low-Cost RFID Tags. Proc. OTM Federated Conf. and Workshop: IS Workshop.Nov ( 2006).

DOI: 10.1007/11915034_59

Google Scholar

[5] P. Peris-Lopez, J.C. Hernandez-Castro. M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. Proc. Int'l Conf. Ubiquitous Intelligence and Computing (2006), pp.912-923.

DOI: 10.1007/11833529_93

Google Scholar

[6] P. Peris-Lopez, J.C. Hernandez-Castro. Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol. Information Security Applications (2009).

DOI: 10.1007/978-3-642-00306-6_5

Google Scholar

[7] Gildas Avoine, Xavier Carpent, Benjamin Martin. Privacy-friendly synchronized Ultralightweight authentication protocols in the storm. Journal of Network and Computer Applications Vol. 35 (2012), p.826–843.

DOI: 10.1016/j.jnca.2011.12.001

Google Scholar

[8] Paolo D'Arco, Alfredo De Santis. On Ultralightweight RFID Authentication Protocols. IEEE Transactions On Dependable And Secure Computing, Vol.8, No.4, July-August (2011).

DOI: 10.1109/tdsc.2010.75

Google Scholar

[9] Lijun gao, Maode Ma. A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems. Wireless Pers Commun (2012).

DOI: 10.1007/s11277-012-0770-8

Google Scholar

[10] Tagra D, Rahman M, Sampalli S. Technique for preventing DoS attacks on RFID systems. 18th international conference on software telecommunications and computer networks—SoftCOM'10 Bol, Island of Brac, Croatia: IEEE Computer Society (2010).

Google Scholar