RFID lightweight authentication protocol based on PRF

被引:0
作者
Jin, Yongming [1 ]
Wu, Qiying [2 ]
Shi, Zhiqiang [1 ]
Lu, Xiang [1 ,3 ]
Sun, Limin [1 ]
机构
[1] State Key Laboratory of Information Security, Institue of Information Engineering, Chinese Academy of Sciences, Beijing
[2] School of Mathematics and Statistics, Central South University, Changsha
[3] Jiangsu R and D Center for Internet of Things, Wuxi, 214135, Jiangsu
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2014年 / 51卷 / 07期
关键词
Authentication; Lightweight; Pseudorandom function; Radio frequency identification (RFID); Security;
D O I
10.7544/issn1000-1239.2014.20131663
中图分类号
学科分类号
摘要
Radio frequency identification (RFID) is a wireless automatic identification and data capture technology that uses radio signals to identify a product, animal or person without the need for physical access or line of sight. The wide deployment of RFID systems in a variety of applications has raised many concerns about the security and privacy. RFID authentication protocol can implement the identification between the reader and the tag, and ensure only legitimate reader to access the tag's data. Because of cost constraints of the tag, the design of lightweight RFID authentication protocol is the main challenge. In order to achieve the unpredictability of privacy, the tag requires at least having the ability of pseudorandom function (PRF). In this paper, a framework of RFID lightweight authentication protocol based on PRF is described abstractly. Based on the implementation of message authentication function Fi, a new RFID lightweight authentication protocol, ELAP, is proposed. Compared with the existing protocol, the new protocol can achieve mutual authentication between reader and tag, and resistant to all known attacks. In the efficiency, the tag need only two-time message digest computing, thus the computational cost of the tag is the minimum.
引用
收藏
页码:1506 / 1514
页数:8
相关论文
共 26 条
[1]  
Henrici D., RFID Security and Privacy: Concepts, Protocols, and Architectures, (2008)
[2]  
Zhou Y., Feng D., Design and analysis of cryptographic protocols for RFID, Chinese Journal of Computers, 29, 4, pp. 581-590, (2006)
[3]  
Berbain C., Billet O., Etrog J., Et al., An efficient forward private RFID protocol, pp. 43-53, (2009)
[4]  
Peris-Lopez P., Hernandez-Castro C., Estevez-Tapiador M., Et al., LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags, pp. 1-12, (2006)
[5]  
Chien H.Y., Chen C.H., Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards, Computer Standards & Interfaces, 29, 2, pp. 254-259, (2007)
[6]  
Karthikeyan S., Nesterenko M., RFID security without extensive cryptography, pp. 63-67, (2005)
[7]  
Duc N., Park J., Lee H., Et al., Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning
[8]  
Ohkubo M., Suzuki K., Kinoshita S., Cryptographic approach to “ privacy-friendly” tags, pp. 1-9, (2003)
[9]  
Ma C., Low cost RFID authentication protocol with forward privacy, Chinese Journal of Computers, 34, 8, pp. 1388-1398, (2011)
[10]  
Vaudenay S., On privacy models for RFID, pp. 68-87, (2007)