Computer Science ›› 2017, Vol. 44 ›› Issue (2): 206-208, 227.doi: 10.11896/j.issn.1002-137X.2017.02.033

Previous Articles     Next Articles

New Mutual Authentication for Lightweight RFID Protocols

LIU Yi and GU Guo-sheng   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Radio frequency identification (RFID) technology is an automated identification technology which is widely used to identify and track all kind of objects.It is well suitable for many fields.However,it is a challenging task to design an authentication protocol because of the limited resource of lightweight RFID tags.Recently,a lightweight RFID authentication protocol of RFID tags were presented by Kulseng et al.This protocol uses physically unclonable functions (PUFs) and linear feedback shift registers (LFSRs) which are well known for lightweight operations.Unfortunately,their protocols face several serious security issues.In this paper,based on PUFs and LFSRs,we suggested a new mutual authentication for low-cost RFID Systems.Security analysis shows that our protocol owns better security and privacy.

Key words: RFID,Lightweight,PUF,LFSR,Mutual authentication

[1] ZHOU S J,ZHANG W Q,LUO J Q.Overview of radio frequency identification (RFID) privacy protection technology [J].Journal of Software,2015,6(4):960-976.(in Chinese) 周世杰,张文清,罗嘉庆.射频识别(RFID)隐私保护技术综述[J].软件学报,2015,6(4):960-976.
[2] JIN Y M,WU Q Y,SHI Z Q,et al.RFID Lightweight Authentication Protocol Based on PRF[J].Journal of Computer Research and Development,2014,51(7):1506-1514.(in Chinese) 金永明,吴棋滢,石志强,等.基于PRF的RFID轻量级认证协议研究[J].计算机研究与发展,2014,1(7):1506-1514.
[3] LU L.Wireless Key Generation for RFID System[J].Chinese Journal of Computers,2015,38(4):822-832.(in Chinese) 鲁力.RFID系统密钥无线生成[J].计算机学报,2015,8(4):822-832.
[4] WANG L M,YI X L,LV C,et al.Security Improvement in Authentication Protocol for Gen-2 Based RFID System[J].JCIT,2011,6(1):157-169.
[5] ZHANG J S,WANG W D,MA J,et al.A Novel Authentication Protocol suitable to EPC Class 1 Generation 2 RFID system[J].JCIT,2012,7(3):259-266.
[6] AVOINE G,LAURADOUX C,MARTIN T.When Compro-mised Readers Meet RFID[C]∥Workshop on Information Security Applications(WISA’09).2009:36-50.
[7] LU L,HAN J,HU L,et al.Dynamic key-updating:Privacy-preserving authentication for rfid systems[C]∥Fifth Annual IEEE International Conference on Pervasive Computing and Communications.2007:13-22.
[8] SONG B,MITCHELL C J.RFID authentication protocol forlow-cost tags[C]∥Proceedings of the First ACM Conference on Wireless Network Security.2008:140-147.
[9] LO N W,YEH K H.An efficient mutual authentication schemefor epcglobal class-1 generation-2 rfid system[C]∥Proceedings of the 2007 Conference on Emerging Direction in Embedded and Ubiquitous Computing.2007:43-56.
[10] ALOMAIR B,CUELLAR J,POOVENDRAN R.Scalable RFID systems:A privacy-preserving protocol with constant time identification [J].IEEE Trans on Parallel and Distributed Systems,2012,3(8):1-10.
[11] GODOR G,IMRE S.Hash-based mutual authentication protocol for low-cost RFID systems[C]∥Proc of the 18th EUNICE Conf on Information and Communications Technologies.Berlin:Springer,2012:76-87.
[12] MAMUN M S I,MOUAKJI A,RAHMAN M S.A secure and private RFID authentication protocol under SLPN problem[C]∥Proc of the 6th Int Conf on Network and System Security.Berlin:Springer,2012:476-489.
[13] WANG S H,LIU S J,CHEN D W.Scalable RFID Mutual Authentication Protocol with Backward Privacy[J].Journal of computer Research and Development,2013,0(6):1276-1284.(in Chinese) 王少辉,刘素娟,陈丹伟.满足后向隐私的可扩展RFID双向认证方案[J].计算机研究与发展,2013,0(6):1276-1284.
[14] BOLOTNYY L,ROBINS G.Physically unclonable function-based security and privacy in RFID systems[C]∥Fifth Annual IEEE International Conference on Pervasive Computing and Communications .2007:211-220.
[15] KULSENG L,YU Z,WEI Y,et al.Lightweight mutual authentication and ownership transfer for rfid systems[C]∥Procee-dings of the 29th Conference on Information Communications.2010:251-255.
[16] KARDAS S,AKGUN M,KIRAZ M S,et al.Cryptanalysis of Lightweight Mutual Authentication and Ownership Transfer for RFID Systems[C]∥Workshop on Lightweight Security & Privacy:Devices,Protocols,and Applications.2011:20-25.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .