A Secure Lightweight Mutual Authentication for RFID Systems

Article Preview

Abstract:

Radio Frequency Identification (RFID) technology is an automated identification technology which is widely used to identify and track all kind of objects. It is well suitable for many fields and is expected to replace barcodes in the near future. However, it is a challenging task to design an authentication protocol because of the limited resource of low-cost RFID tags. Recently, a lightweight RFID authentication protocol presented by Kulseng et al uses Physically Unclonable Functions (PUFs) and Linear Feedback Shift Registers (LFSRs) which are well known lightweight operations. The number of gates which the protocol require can be significantly decreased. Unfortunately, their protocol faces several serious security issues. In this paper, based PUFs and LFSRs, we suggest a secure mutual authentication for low-cost RFID Systems. Security analysis shows that our protocol owns security and privacy.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

4496-4500

Citation:

Online since:

September 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Liangmin WANG, Xiaoluo YI, Chao LV, Yuanbo GUO, Security Improvement in Authentication Protocol for Gen-2 Based RFID System, JCIT, Vol. 6, No. 1, pp.157-169, (2011).

Google Scholar

[2] Junsong Zhang, Wendong Wang, Jian Ma, Xiong Li, A Novel Authentication Protocol suitable to EPC Class 1 Generation 2 RFID system, JCIT, Vol. 7, No. 3, pp.259-266, (2012).

DOI: 10.4156/jcit.vol7.issue3.30

Google Scholar

[3] G. Avoine, C. Lauradoux, and T. Martin, When Compromised Readers Meet RFID", Workshop on Information Security Applications – WISA, 09, vol. 5932, pp.36-50, (2009).

DOI: 10.1007/978-3-642-10838-9_4

Google Scholar

[4] B. Song, C. J. Mitchell, RFID authentication protocol for low-cost tags, In proceedings of the first ACM conference on Wireless network security, vol. 0, p.140–147, (2008).

DOI: 10.1145/1352533.1352556

Google Scholar

[5] L. Bolotnyy, G. Robins, Physically unclonable function-based security and privacy in RFID systems, In Fifth Annual IEEE International Conference on Pervasive Computing and Communications, pp.211-220, (2007).

DOI: 10.1109/percom.2007.26

Google Scholar

[6] L. Kulseng, Z. Yu, Y. Wei, Y. Guan, Lightweight mutual authentication and ownership transfer for rfid systems, In proceedings of the 29th conference on Information communications, pp.251-255, (2010).

DOI: 10.1109/infcom.2010.5462233

Google Scholar

[7] S. Kardas, M. Akgun, M. S. Kiraz, H. Demirci, Cryptanalysis of Lightweight Mutual Authentication and Ownership Transfer for RFID Systems, Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications, pp.20-25, (2011).

DOI: 10.1109/lightsec.2011.10

Google Scholar