Computer Science ›› 2017, Vol. 44 ›› Issue (1): 183-187.doi: 10.11896/j.issn.1002-137X.2017.01.035

Previous Articles     Next Articles

New Ultra-lightweight RFID Authentication Protocol

ZHANG Ya-li, GUO Ya-jun, CUI Jian-qun and ZENG Qing-jang   

  • Online:2018-11-13 Published:2018-11-13

Abstract: RFID (Radio Frequency Identification) technology is widely applied in many fields of life and production,such as access control equipment,payment equipment and others in wireless communication way.However,the wireless communication environment between the reader and the tag makes the RFID device face more malicious attacks and security threats.Because the low-cost tag only has very limited computing power and storage space,the common block cipher and hash function cannot be used for low cost tag.To solve the security problem of the low cost tag,this paper proposed a new ultra-lightweight RFID authentication protocol—SIUAP by using the bit operation code.Based on the lightweight wheel function F(x) and nonlinear function MIXBITS operations,which belong to SIMON algorithm,SIUAP protocol adopts three simple bit operations:Bits AND operation,XOR and cyclic shift operations,which greatly reduces the computational complexity.Through formally analyzing the protocol by GNY logic,it has been proved that the SIUAP protocol can realize the authentication of the reader and tag.Meanwhile,a security analysis of the SIUAP was also given.Compared with the existing ultra-lightweight authentication protocol,the SIUAP protocol has lower computational cost,which can meet the requirements of the RFID system of low cost and high security.

Key words: Radio frequency identification,Ultra-lightweight,Mutual authentication

[1] ZHANG Y,BAI L.Rapid structural condition assessment using radio frequency identification (RFID) based wireless strain sensor[J].Automation in Construction,2015,54(6):1-11.
[2] WARTHA L N R,LONDHE V.Context-Aware Approach for enhancing security and privacy of RFID[J].International Journal of Engineering And Computer Science,2015,4(1):1078-1088.
[3] GARICA J,BARBEAU M,KRANAKIS E.Handling security threats to the RFID system of EPC networks[J].Security of Self-Organizing Networks,2010,12(3):45-64.
[4] DAS M L.Strong Security and Privacy of RFID System for Internet of Things Infrastructure[M]∥Security,Privacy,and Applied Cryptography Engineering.Springer Berlin Heidelberg,2013:56-69.
[5] JIN Yong-ming,WU Qi-ying,SHI Zhi-qiang,et al.Research and development of RFID lightweight authentication protocol based on [J].PRF Computer Research and Development,2014,1(7):1506-1514(in Chinese) 金永明,吴棋滢,石志强,等.基于PRF的RFID轻量级认证协议研究[J].计算机研究与发展,2014,1(7):1506-1514.
[6] CHIEN H.SASI:A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity[J].IEEE Transactions on Dependable and Secure Computing,2007,4(4):337-340.
[7] PERIS-LOPEZ P,HERNANDEZ-CASTRO J C,ESTéVEZ-TAP-IADOR J M,et al.LMAP:A real lightweight mutual authentication protocol for low-cost RFID tags[C]∥Proceedings of the Workshop on RFID Security.2006:12-14.
[8] PERIS-LOPEZ P,HERNANDEZ-CASTRO J C,ESTéVEZ-TAP-IADOR J M,et al.EMAP:An efficient mutual-authentication protocol for low-cost RFID tags[C]∥Proceedings of the OTM 2006 Workshops on the Move to Meaningful Internet Systems.Springer Berlin Heidelberg,2006:352-361.
[9] PERIS-LOPEZ P,HERNANDEZ-CASTRO J C,ESTéVEZ-TAPIADOR J M,et al.M2AP:A minimalist mutual-authentication protocol for low-cost RFID tags[M]∥Ubiquitous Intelligence and Computing.Springer Berlin Heidelberg,2006:912-923.
[10] PERIS-LOPEZ P,HERNANDEZ-CASTRO J C,TAPIADOR J M E,et al.Advances in Ultralightweight cryptography for low-cost RFID tags:Gossamer protocol [M]∥Information Security Applications.Springer Berlin Heidelberg,2009:56-68.
[11] SUN H M,TING W C,WANG K H.On the security of Chien’s ultralightweight RFID authentication protocol[J].IEEE Tran-sactions on Dependable and Secure Computing,2011,2(8):315-317.
[12] ARCO P D,SANTIS A D.On ultralightweight RFID authentication protocols[J].IEEE Transactions on Dep Ependable and Secure Computing,2011,8(4):548-563.
[13] PENG P,ZHAO Y M,HAN W L,et al.Ultra-lightweight RFID Mutual Authentication Protocol[J].Computer Engineering,2011,37(16):140-142.
[14] TIAN Y,CHEN G,LI J.A New Ultralightweight RFID Authentication Protocol with Permutation[J].IEEE Communications Letters,2012,16(5):702-705.
[15] WANG shao-hui,HAN zhi-jie,LIU Su-juan,et al.Security Analysis of RAPP an FRID Authentication Protocol based on Permutation[R].Cryptology ePrint Archive,Report 2012/327,2.
[16] AHMADIAN Z,SALMASIZADEH M,AREF M R.Desynchronization attack on RAPP ultralightweight authentication protocol[J].Information Processing Letters,2013,113(7):205-209.
[17] ABED F,LIST E,LUCKS S,et al.Differential and linear cryptanalysis of reduced-round SIMON[R].Cryptology EPrint Archive,Report 2013/526,2013.
[18] ZHANG D,LI G,PAN Z,et al.A new anti-collision algorithm for RFID tag[J].International Journal of Communication Systems,2014,27(11):3312-3322.
[19] BURROWS M,ABADI M,NEEDHAM R M.A logic of authentication[C]∥Proceedings of the Royal Society of London A:Mathematical,Physical and Engineering Sciences.The Royal Society,1989:233-271.
[20] SAUL E,HUTCHISON A C M.A graphical environment forthe facilitation of logic-based security protocol analysis[J].South African Computer Journal,2000(26):196-200.
[21] GONG L,NEEDHAM R,YAHALOM R.Reasoning about belief in cryptographic protocols[C]∥Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy.California:IEEE Computer Society Press,1990:234-248.
[22] MA Chang-she.Low Cost RFID Authentication Protocol with Forward Privacy[J].Chinese Journal of Computers,2011,4(8):1387-1398.(in Chinese) 马昌社.前向隐私安全的低成本RFID认证协议[J].计算机学报,2011,34(8):1387-1398

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .