Review of different classes of RFID authentication protocols

被引:31
作者
Ibrahim, Alaauldin [1 ]
Dalkilic, Gokhan [1 ]
机构
[1] Dokuz Eylul Univ, Comp Engn Dept, TR-35160 Izmir, Turkey
关键词
Authentication protocols; Radio-frequency identification; Radio-frequency identification attacks; Radio-frequency identification authentication protocols; TREE-LSHB PLUS; LOW-COST; STRONG PRIVACY; HB-NUMBER; SECURITY; IDENTIFICATION; CRYPTANALYSIS; SYSTEMS; TAGS; SCHEME;
D O I
10.1007/s11276-017-1638-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio-frequency identification (RFID) is an up-and-coming technology. The major limitations of RFID technology are security and privacy concerns. Many methods, including encryption, authentication and hardware techniques, have been presented to overcome security and privacy problems. This paper focuses on authentication protocols. The combination of RFID technology being popular but unsecure has led to an influx of mutual authentication protocols. Authentication protocols are classified as being fully fledged, simple, lightweight or ultra-lightweight. Since 2002, much important research and many protocols have been presented, with some of the protocols requiring further development. The present paper reviews in detail recently proposed RFID mutual authentication protocols, according to the classes of the authentication protocols. The protocols were compared mainly in terms of security, the technique that they are based on, protocols that the presented protocol has been compared with, and finally, the method of verifying the protocol. Important points of the comparisons were collected in two tables.
引用
收藏
页码:961 / 974
页数:14
相关论文
共 154 条
[1]  
Alavi S M., 2014, Advances in Computer Science: an International Journal (ACSIJ), V3, P44
[2]   Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification [J].
Alomair, Basel ;
Clark, Andrew ;
Cuellar, Jorge ;
Poovendran, Radha .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (08) :1536-1550
[3]  
[Anonymous], 2011, HDB SMART ANTENNAS R
[4]  
[Anonymous], 2007, Proceedings of the 2nd ACM symposium on Information, computer and communications security
[5]  
[Anonymous], P C CRYPT HARDW EMB
[6]  
[Anonymous], 2006, CHINESE RFID TECHNOL
[7]  
[Anonymous], J MED SYSTEMS
[8]   A Privacy-friendly RFID Protocol using Reusable Anonymous Tickets [J].
Asadpour, Mahdi ;
Dashti, Mohammad Torabi .
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, :206-213
[9]   A scalable and provably secure hash-based RFID protocol [J].
Avoine, G ;
Oechslin, P .
Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, :110-114
[10]  
Avoine G, 2010, LECT NOTES COMPUT SC, V6370, P138, DOI 10.1007/978-3-642-16822-2_13