Lightweight encryption function structure protection of RFID security protocol

被引:0
|
作者
机构
[1] College of Computer Science and Engineering, Jilin University
[2] Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University
[3] Australian School of Business, University of New South Wales
来源
Dantong, O. (ouyangdantong@163.com) | 1600年 / Advanced Institute of Convergence Information Technology卷 / 04期
关键词
Authentication protocol; Lightweight encryption function structure protection; RFID;
D O I
10.4156/AISS.vol4.issue7.18
中图分类号
学科分类号
摘要
In this paper, a new security requirement about RFID protocols is proposed firstly, it is lightweight encryption function structure protection. Subsequently, a lightweight RFID authentication protocol is proposed as a case study, this protocol only requires O(1) work to identify and authenticate a tag in the server and only one-way hash function, XOR operation are needed in tags. In addition, we give formal reasoning for this protocol by using GNY logic; the security properties of this protocol are analyzed as well by comparing with the related RFID protocols.
引用
收藏
页码:155 / 162
页数:7
相关论文
共 50 条
  • [41] A Security Protocol Designed with Proxy for RFID
    Zhou Jun
    Xu Yong-jun
    Li Xiao-wei
    2012 WORLD AUTOMATION CONGRESS (WAC), 2012,
  • [42] A Secure Protocol for Ultra lightweight Radio Frequency Identification (RFID) Tags
    Eghdamian, Aras
    Samsudin, Azman
    INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT I, 2011, 251 : 200 - 213
  • [44] Scalable RFID security framework and protocol supporting Internet of Things
    Ray, Biplob R.
    Abawajy, Jemal
    Chowdhury, Morshed
    COMPUTER NETWORKS, 2014, 67 : 89 - 103
  • [45] Security and Privacy Analysis of Song–Mitchell RFID Authentication Protocol
    Mohammad Hassan Habibi
    Mohammad Reza Aref
    Wireless Personal Communications, 2013, 69 : 1583 - 1596
  • [46] Security analysis of two lightweight RFID authentication protocols
    Wang Shao-hui
    Han Zhijie
    Liu Sujuan
    Chen Dan-wei
    ANNALS OF TELECOMMUNICATIONS-ANNALES DES TELECOMMUNICATIONS, 2014, 69 (5-6): : 273 - 282
  • [47] Security analysis of two lightweight RFID authentication protocols
    Wang Shao-hui
    Han Zhijie
    Liu Sujuan
    Chen Dan-wei
    annals of telecommunications - annales des télécommunications, 2014, 69 : 273 - 282
  • [48] Security and privacy analysis of RFID authentication protocol for ubiquitous computing
    Kim, Hyun-Seok
    Choi, Jin-Young
    PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 1359 - +
  • [49] A Lightweight Protocol Analysis and Modification for Secure RFID System
    Kim, Hyun-Seok
    Choi, Jin-Young
    2008 PROCEEDINGS OF 17TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1 AND 2, 2008, : 958 - +
  • [50] Secure and Lightweight Authentication Protocol for Mobile RFID Privacy
    Lee, Hyeong-Chan
    Eom, TaeYang
    Yi, Jeong Hyun
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (01): : 421 - 426