A Modified Two-Way Authentication Protocol without Server for RFID

Article Preview

Abstract:

It is necessary for researchers to design lightweight authentication protocols to protect information security between tag and reader in RFID system. It is a great challenge to design an efficient and secure protocol because the tag has limited computation resource. In the paper, we firstly analyze some protocols. Secondly, we introduce a serverless authentication protocol for RFID system and analyze its security. We find it does not provide two-way authentication. Thirdly, we propose a modified two-way authentication protocol without server for RFID. The result indicates it provides privacy protection, resists tracking, and resists cloning attack. Moreover, it provides two-way authentication. For the efficiency, we think the computational complexity of our protocol is at the same level with the original protocol.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2709-2713

Citation:

Online since:

August 2010

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] S. E. Sarma, S. A. Weis, and D. W. Engels, RFID systems and security and privacy implications, Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems. Lectures Notes in Computer Science, vol. 2523, 2003, pp.454-469.

DOI: 10.1007/3-540-36400-5_33

Google Scholar

[2] S. A. Weis , S. E. Sarma , R. L. Rivest , D. W. Engels. Security and privacy aspects of low-cost radio frequency identification systems, Proceedings of the 1st International Conference on Security in Pervasive Computing. Lectures Notes in Computer Science, vol. 2802 , pp.201-212.

DOI: 10.1007/978-3-540-39881-3_18

Google Scholar

[3] Miyako Ohkubo, Koutarou Suzuki and Shingo Kinoshita, Cryptographic Approach to a Privacy Friendly Tag, RFID Privacy Workshop@MIT, (2003).

Google Scholar

[4] Yong Ki Lee, Ingrid Verbauwhede. Secure and Low-cost RFID Authentication Protocols, Proceedings of the 2nd IEEE Workshop on Adaptive Wireless Networks, (2005).

Google Scholar

[5] Gene Tsudik, YA-TRAP: yet another trivial RFID authentication protocol, Pervasive Computing and Communications Workshops, 2006, pp.640-643.

DOI: 10.1109/percomw.2006.152

Google Scholar

[6] N. J. Hopper, M. Blum, Secure human identification protocols, Advances in Cryptology - ASIACRYPT. Lecture Notes in Computer Science, vol. 2248, 2001, pp.52-66.

DOI: 10.1007/3-540-45682-1_4

Google Scholar

[7] A. Juels, S. A. Weis. Authenticating pervasive devices with human protocols, Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, 2005, p.294319.

DOI: 10.1007/11535218_18

Google Scholar

[8] H. Gilbert, M. Robshaw, H. Sibert, An active attack against HB+ - a provably secure lightweight protocol, Cryptology ePrint Archive, Report 2005/237, 2005. http: /eprint. iacr. org.

DOI: 10.1049/el:20052622

Google Scholar

[9] Chiu C. Tan, Bo Sheng, Qun Li, Serverless Search and Authentication Protocols for RFID, Proceedings of International Conference on Pervasive Computing and Communications, 2007, pp.3-12.

DOI: 10.1109/percom.2007.30

Google Scholar