Computer Science ›› 2013, Vol. 40 ›› Issue (12): 141-146.

Previous Articles     Next Articles

Ultralightweight RFID Mutual-authentication Protocol

LIU Ya-li,QIN Xiao-lin and WANG Chao   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Due to the open wireless communication environments in radio frequency identification (RFID) systems,particularly the reader-tag air interface,security and privacy are increasingly becoming noteworthy issues.It is imperative to design ultralightweight RFID authentication protocols to resist various malicious attacks and threats.A new ultralightweight RFID mutual-authentication protocol for low-cost was proposed,which avoids the security omission in the previous RFID authentication protocols.Security analysis shows that the protocol possesses robust security and privacy properties as well as defending against the possible malicious attacks.In terms of the resource-constrained requirements of low-cost RFID tags,the protocol requires only two simple bitwise operations over the tag end and meanwhile it has better performance advantages compared with other ultralightweight RFID authentication protocols.

Key words: RFID,Ultralightweight,Mutual authentication,Low-cost

[1] Juels A.RFID Security and Privacy:A Research Survey [J].IEEE Journal on Selected Areas in Communications,2006,24(2):381-394
[2] Juels A.Strengthening EPC Tag against Cloning [C]∥Procee-dings of the 4th ACM Workshop on Wireless Security.ACM,2005:67-76
[3] Liu Ya-li,Qin Xiao-lin,Li Bo-han,et al.A Forward-SecureGrouping-proof Protocol for Multiple RFID tags [J].International Journal of Computational Intelligence Systems,2012,5(5):824-833
[4] Chien H Y,Chen C H.Mutual Authentication Protocol forRFID Conforming to EPC Class-1Generation-2Standards [J].Computer Standards and Interfaces,2007,29(2):254-259
[5] Rotter P.A Framework for Assessing RFID System Securityand Privacy Risks [J].IEEE Pervasive Computing,2008,7(2):70-77
[6] Zuo Y.Survivable RFID Systems:Issues,Challenges,and Techniques [J].IEEE Transactions on Systems,Man,and Cyberne-tics-Part C:Applications and Reviews,2010,40(4):406-418
[7] Chien H Y.SASI:A New Ultralightweight RFID Authentica-tion Protocol Providing Strong Authentication and Strong Integrity [J].IEEE Transactions on Dependable and Secure Computing,2007,4(4):337-340
[8] Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.LMAP:A Real Lightweight Mutual Authentication Protocol for Low-Cost RFID Tags [C]∥Proc.Second Workshop RFID Security.Graz,Austria,2006:12-14
[9] Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.EMAP:An Efficient Mutual Authentication Protocol for Low-Cost RFID Tags [C]∥Proc.OTM Federated Conf.and Workshop:IS Workshop (IS’06).LNCS 4277,Springer-Verlag,Berlin Heidelberg,2006:352-361
[10] Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.M2AP:A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags [C]∥Proc.Int’l Conf.Ubiquitous Intelligence and Computing (UIC’06).LNCS 4159,2006:912-923
[11] Lo N W,Shie H S,Yeh K H.A Design of RFID Mutual Authentication Protocol Using Lightweight Bitwise Operations [C]∥Proc.the 3rd Joint Workshop on Information Security (JWIS 2008).Seoul,Korea,2008
[12] Li Tie-yan.Employing Lightweight Primitives on Low-costRFID Tags for Authentication [C]∥Proc.Vehicular Technology Conference 2008(VTC’08).IEEE,68th,2008:1-5
[13] Burmester M,Munilla O.Lightweight RFID Authenticationwith Forward and Backward Security [J].ACM Transactions on Information and System Security (TISSEC),2011,14(1):11-37
[14] Li Tie-yan,Deng R.Vulnerability Analysis of EMAP-An Effi-cient RFID Mutual Authentication Protocol [C]∥ The Second International Conference on Availability,Reliability and Security (ARES’07).IEEE,2007:238-245
[15] Li Tie-yan,Wang Gui-lin.Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols [C]∥New Approaches for Security,Privacy and Trust in Complex Environments.Springer US,2007,232:109-120
[16] Chien H Y,Huang C W.Security of Ultra-Lightweight RFIDAuthentication Protocols and Its Improvements [J].ACM Operating System Rev.,2007,41(2):83-86
[17] Safkhani M,Bagheri N,Naderi M,et al.Security Analysis ofLMAP++,an RFID Authentication Protocol [C]∥Proc.2011International Conference for Internet Technology and Secured Transactions (ICITST’11).IEEE,2011:689-694
[18] Sun H M,Ting W C,Wang K H.On the Security of Chien’s Ultralightweight RFID Authentication Protocol [J].IEEE Tran-sactions on Dependable and Secure Computing,2011,8(2):315-317
[19] Vajda I,Butty’an L.Lightweight Authentication Protocols for Low-cost RFID Tags [C]∥Proc.Second Workshop on Security in Ubiquitous Computing-Ubicomp (UBICOMP’03).2003
[20] Juels A.Minimalist Cryptography for Low-cost RFID Tags [C]∥SCN’04Proceedings of the 4th International Conference on Security in Communication Networks.Springer Berlin Heidelberg,2005:149-164
[21] Arco P D,De Santis A.On Ultralightweight RFID Authentication Protocols [J].IEEE Transactions on Dependable and Secure Computing,2011,8(4):548-563
[22] Tian Yun,Chen Gong-liang,Li Jian-hua.A New Ultralight-weight RFID Authentication Protocol with Permutation [J].IEEE Communications Letters,2012,16(5):702-705
[23] Wang Shao-hui,Han Zhi-jie,Liu Su-juan,et al.Security Analysis of RAPP An RFID Authentication Protocol based on Permutation [R].Cryptology ePrint Archive,Report 2012/327,2012
[24] Ahmadian Z,Salmasizadeh M,Aref M R.Desynchronization Attack on RAPP Ultralightweight Authentication Protocol [J].Information Processing Letters,2013,113(7):205-209
[25] Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.LAMED-A PRNG for EPC Class-1Generation-2RFID Specification [J].Computer Standards and Interfaces,2009,31:88-97

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!