Computer Science ›› 2015, Vol. 42 ›› Issue (2): 95-99.doi: 10.11896/j.issn.1002-137X.2015.02.020

Previous Articles     Next Articles

Lightweight RFID Authentication Protocol Based on Digital Signature

LIU Ya-li, QIN Xiao-lin, ZHAO Xiang-jun, HAO Guo-sheng and DONG Yong-quan   

  • Online:2018-11-14 Published:2018-11-14

Abstract: The issues of security and privacy in RFID systems become the handicap to the development of RFID technology and the bottle neck of their further pervasive usage.A lightweight RFID authentication protocol based on digital signature was proposed,which combines digital signature technology and RFID authentication technology properly to implement the lightweight authentication mechanism of RFID systems successfully.Performance evaluation shows that this protocol not only has main security and privacy properties,but also can resist a variety of typical malicious attacks and threats.The security of this protocol is based on the assumption of difficulty in solving the discrete logarithm hard problem in the finite field and the security of pseudo random number generator.The protocol puts the higher cost operations of public key cryptography over the server end,which ensures the lightweight operation of the tag end and promotes the further application of public key cryptography in RFID systems.

Key words: RFID,Lightweight,Authentication protocol,Digital signature

[1] Schneider M.Radio frequency identification (RFID) technology and its applications in the commercial construction industry[D].University of Kentucky,2003
[2] Chawla V,Dong-Sam H.An overview of passive RFID[J].Communications Magazine,IEEE,2007,45(9):11-17
[3] Roussos G,Kostakos V.rfid in pervasive computing:State-of-the-art and outlook[J].Pervasive and Mobile Computing,2009,5(1):110-131
[4] Want R.The Magic of RFID[J].Queue,2004,2(7):40-48
[5] Juels A.RFID security and privacy:a research survey[J].IEEE Journal on Selected Areas in Communications,2006,24(2):381-394
[6] Hlavácˇ .Known-Plaintext-Only Attack on RSA-CRT withMontgomery Multiplication[C]∥Cryptographic Hardware and Embedded Systems(CHES 2009).Springer,2009:128-140
[7] Nithyanand R.The evolution of cryptographic protocols in electronic passports:Cryptology ePrint archive[R].Report 2009/200
[8] Yanjun Z.Survivable RFID Systems:Issues,Challenges,andTechniques[J].IEEE Transactions on Systems,Man,and Cybernetics,Part C:Applications and Reviews,2010,40(4):406-418
[9] Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.LAMED-A PRNG for EPC Class-1 Generation-2 RFID specification[J].Comput.Stand.Interfaces.,2009,31(1):88-97
[10] Batina L,Guajardo J,Kerins T,et al.Public-Key Cryptography for RFID-Tags[C]∥Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops,2007(PerCom Workshops’07).2007:217-222
[11] McLoone M,Robshaw M J B.New Architectures for Low-Cost Public Key Cryptography on RFID Tags[C]∥ IEEE International Symposium on Circuits and Systems,2007(ISCAS 2007).2007:1827-1830
[12] Hoffstein J,Howgrave-Graham N,Pipher J,et al.NTRUSign:Digital Signatures Using the NTRU Lattice[C]∥Joye M,ed.Topics in Cryptology(CT-RSA 2003).Springer Berlin Heidelberg,2003:122-140
[13] Hutter M,Feldhofer M,Plos T.An ECDSA Processor for RFID Authentication[C]∥Yalcin S O,ed.Radio Frequency Identification:Security and Privacy Issues.Springer Berlin Heidelberg,2010:189-202
[14] Calmels B,Canard S,Girault M,et al.Low-Cost Cryptography for Privacy in RFID Systems[C]∥Domingo-Ferrer J,Posegga J,Schreckling D,eds.Smart Card Research and Advanced Applications.Springer Berlin Heidelberg,2006:237-251
[15] Liang Y,Rong C.RFID System Security Using Identity-Based Cryptography[C]∥Presented at the Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing.Oslo,Norway,2008:482-489
[16] Liu Ya-li,Qin Xiao-lin,Li Bo-han.Forward-Secure Blind Signature Schemes Based on the Variants of ElGamal[J].China Communications,2010,7(4):58-64
[17] C Hung-yu.SASI:A New Ultralightweight RFID Authentica-tion Protocol Providing Strong Authentication and Strong Integrity[J].IEEE Transactions on Dependable and Secure Computing,2007,4 (4):337-340

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!