An efficient ultralightweight authentication protocol for RFID systems

被引:0
作者
Yeh K.-H. [1 ]
Lo N.W. [1 ]
Winata E. [1 ]
机构
[1] Department of Information Management, National Taiwan University of Science and Technology
关键词
Authentication; Privacy; RFID; Security; Ultralightweight;
D O I
10.3233/978-1-60750-485-6-49
中图分类号
学科分类号
摘要
Since Peris-Lopez et al. proposed the design of ultralightweight authentication schemes [35-37] for low-cost RFID tags in 2006, research community has demonstrated a significant advancement on this interesting research area in recent years. However, previously published studies are subject to either various security vulnerabilities or inefficient management on tag memory. Motivated by the nature of resource limitation in a tag, we develop a process-oriented ultralightweight RFID authentication protocol which delivers strong security intensity, robust privacy protection as well as less tag memory space required. In addition, a randomness evaluation on the output values of our scheme is performed to ensure the proposed authentication protocol produces qualified output randomness. Our security analysis and performance comparison show that our process-oriented authentication scheme outperforms relevant works by supporting essential system security criteria with less computation effort and better tag memory utilization. © 2010 The authors and IOS Press. All rights reserved.
引用
收藏
页码:49 / 60
页数:11
相关论文
共 46 条
[1]  
An Y., Oh S., RFID system for user's privacy protection, Proc. of the Asia-pacific Conference on Communications, pp. 516-519, (2005)
[2]  
Avoine G., Dysli E., Oechslin P., Reducing time complexity in RFID systems, Proc. of the Workshop on SAC'05 (2005)
[3]  
Bringer J., Chabanne H., Dottax E., Hb++: A lightweight authentication protocol secure against some attacks, International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, pp. 28-33, (2006)
[4]  
Burmester M., De Medeiros B., The security of EPC Gen2 compliant RFID protocols, International Conference of Applied Cryptography and Network Security, 5037 LNCS, pp. 490-506, (2008)
[5]  
Cao T., Bertino E., Lei H., Security analysis of the SASI protocol, IEEE Transactions on Dependable and Secure Computing, 6, pp. 73-77, (2008)
[6]  
Chen C.-L., Den Y.-Y., Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection, Engineering Applications of Artificial Intelligence, 22, pp. 1284-1291, (2009)
[7]  
Chen Y.-C., Wang W.-L., Hwang M.-S., RFID authentication protocol for anti-counterfeiting and privacy protection, Proc. of the ICACT'07, pp. 255-259, (2007)
[8]  
Chen Y., Chou J.-S., Sun H.-M., A novel mutual authentication scheme based on quadratic residues for RFID systems, Computer Networks, 52, 12, pp. 2373-2380, (2008)
[9]  
Chien H.-Y., Chen C.-H., Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards, Computer Standards & Interfaces, 29, pp. 254-259, (2007)
[10]  
Chien H.-Y., Huang C.-W., Security of ultra-lightweight RFID authentication protocols and its improvements, ACMSIGOPS Operating System Review, 41, pp. 83-86, (2007)