A Revised Serverless Authentication Protocol with Forward Security for RFID

Article Preview

Abstract:

Information security problem has become one of the hottest issues in RFID system. More and more researchers begin to study how to provide security protection in the RFID system. In the paper, we mainly research lightweight authentication protocols in RFID system. Firstly, we analyze some protocols. Secondly, we introduce a serverless authentication protocol for RFID system and analyze its security. We find it does not provide forward security. Thirdly, we propose a revised serverless authentication protocol with forward security. It provides two-way authentication and privacy protection, resists tracking and cloning attack as well as the original protocol. Moreover, it provides forward security protection and resists desynchronization attack. For the efficiency, its computational complexity is at the same level with the protocol proposed by Tan et al.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2267-2272

Citation:

Online since:

August 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] S. E. Sarma, S. A. Weis, and D. W. Engels, RFID systems and security and privacy implications, Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems. Lectures Notes in Computer Science, vol. 2523, 2003, pp.454-469.

DOI: 10.1007/3-540-36400-5_33

Google Scholar

[2] S. A. Weis , S. E. Sarma , R. L. Rivest , D. W. Engels. Security and privacy aspects of low-cost radio frequency identification systems, Proceedings of the 1st International Conference on Security in Pervasive Computing. Lectures Notes in Computer Science, vol. 2802 , pp.201-212.

DOI: 10.1007/978-3-540-39881-3_18

Google Scholar

[3] Miyako Ohkubo, Koutarou Suzuki and Shingo Kinoshita, Cryptographic Approach to a Privacy Friendly Tag, RFID Privacy Workshop@MIT, (2003).

Google Scholar

[4] N. J. Hopper, M. Blum, Secure human identification protocols, Advances in Cryptology - ASIACRYPT. Lecture Notes in Computer Science, vol. 2248, 2001, pp.52-66.

DOI: 10.1007/3-540-45682-1_4

Google Scholar

[5] A. Juels, S. A. Weis. Authenticating pervasive devices with human protocols, Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, 2005, pp.294-319, (2005).

DOI: 10.1007/11535218_18

Google Scholar

[6] H. Gilbert, M. Robshaw, H. Sibert, An active attack against HB+ - a provably secure lightweight protocol, Cryptology ePrint Archive, Report 2005/237, 2005. http: /eprint. iacr. org.

DOI: 10.1049/el:20052622

Google Scholar

[7] J. Bringer, H. Chabanne, and E. Dottax, HB ++: A lightweight authentication protocol secure against some attacks, Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2006, pp.28-33.

DOI: 10.1109/secperu.2006.10

Google Scholar

[8] Selwyn Piramuthu, HB and Related Lightweight Authentication Protocols for Secure RFID Tag-Reader Authentication, Collaborative Electronic Commerce Technology and Research. Basel, (2006).

Google Scholar

[9] Yong-Zhen Li, Young-Bok Cho, Nam-Kyoung Um, Sang-Ho Lee, Security and Privacy on Authentication Protocol for Low-cost RFID, International Conference on Computational Intelligence and Security, vol2, 2006, pp.1101-1104.

DOI: 10.1109/iccias.2006.295432

Google Scholar

[10] Hung-Yu Chien, Chen-Wei Huang, A Lightweight RFID Protocol Using Substring , Lecture Notes in Computer Science, vol 4808, 2007, pp.422-431.

DOI: 10.1007/978-3-540-77092-3_37

Google Scholar

[11] Chiu C. Tan, Bo Sheng, Qun Li, Serverless Search and Authentication Protocols for RFID, Proceedings of International Conference on Pervasive Computing and Communications, 2007, pp.3-12.

DOI: 10.1109/percom.2007.30

Google Scholar