Lightweight encryption function structure protection of RFID security protocol

被引:0
|
作者
机构
[1] College of Computer Science and Engineering, Jilin University
[2] Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University
[3] Australian School of Business, University of New South Wales
来源
Dantong, O. (ouyangdantong@163.com) | 1600年 / Advanced Institute of Convergence Information Technology卷 / 04期
关键词
Authentication protocol; Lightweight encryption function structure protection; RFID;
D O I
10.4156/AISS.vol4.issue7.18
中图分类号
学科分类号
摘要
In this paper, a new security requirement about RFID protocols is proposed firstly, it is lightweight encryption function structure protection. Subsequently, a lightweight RFID authentication protocol is proposed as a case study, this protocol only requires O(1) work to identify and authenticate a tag in the server and only one-way hash function, XOR operation are needed in tags. In addition, we give formal reasoning for this protocol by using GNY logic; the security properties of this protocol are analyzed as well by comparing with the related RFID protocols.
引用
收藏
页码:155 / 162
页数:7
相关论文
共 50 条
  • [21] Security analysis of an ultra-lightweight RFID authentication protocol for m-commerce
    Aghili, Seyed Farhad
    Mala, Hamid
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (03)
  • [22] Enhancements to a Lightweight RFID Authentication Protocol
    Zhang, Xiaowen
    Zhang, Zhanyang
    Wei, Xinzhou
    ICEBE 2009: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2009, : 454 - +
  • [23] A lightweight RFID protocol using substring
    Chien, Hung-Yu
    Huang, Chen-Wei
    EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4808 : 422 - 431
  • [24] On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags
    Wang, King-Hang
    Chen, Chien-Ming
    Fang, Weicheng
    Wu, Tsu-Yang
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (01) : 65 - 70
  • [25] Security flaws in a recent RFID delegation protocol
    Erguler, Imran
    Anarim, Emin
    PERSONAL AND UBIQUITOUS COMPUTING, 2012, 16 (03) : 337 - 349
  • [26] Design and Implementation of A RFID Security Authentication Protocol
    Zhang, Lei
    Xiao, Zicong
    2013 2ND INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION AND MEASUREMENT, SENSOR NETWORK AND AUTOMATION (IMSNA), 2013, : 102 - 105
  • [27] On the Security of an ECC Based RFID Authentication Protocol
    Babaheidarian, Parisa
    Delavar, Mahshid
    Mohajeri, Javad
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 111 - 114
  • [28] A Mutual RFID Security Protocol for Wireless Reader
    He Jialiang
    Xu Zhiqiang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 43 - 52
  • [29] A security protocol for RFID traceability
    Gandino, Filippo
    Montrucchio, Bartolomeo
    Rebaudengo, Maurizio
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (06)
  • [30] The Security and Privacy Protection in RFID
    Fu, Chunchang
    He, Weilin
    FRONTIERS OF ADVANCED MATERIALS AND ENGINEERING TECHNOLOGY, PTS 1-3, 2012, 430-432 : 1755 - 1758