Review of different classes of RFID authentication protocols

被引:31
作者
Ibrahim, Alaauldin [1 ]
Dalkilic, Gokhan [1 ]
机构
[1] Dokuz Eylul Univ, Comp Engn Dept, TR-35160 Izmir, Turkey
关键词
Authentication protocols; Radio-frequency identification; Radio-frequency identification attacks; Radio-frequency identification authentication protocols; TREE-LSHB PLUS; LOW-COST; STRONG PRIVACY; HB-NUMBER; SECURITY; IDENTIFICATION; CRYPTANALYSIS; SYSTEMS; TAGS; SCHEME;
D O I
10.1007/s11276-017-1638-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio-frequency identification (RFID) is an up-and-coming technology. The major limitations of RFID technology are security and privacy concerns. Many methods, including encryption, authentication and hardware techniques, have been presented to overcome security and privacy problems. This paper focuses on authentication protocols. The combination of RFID technology being popular but unsecure has led to an influx of mutual authentication protocols. Authentication protocols are classified as being fully fledged, simple, lightweight or ultra-lightweight. Since 2002, much important research and many protocols have been presented, with some of the protocols requiring further development. The present paper reviews in detail recently proposed RFID mutual authentication protocols, according to the classes of the authentication protocols. The protocols were compared mainly in terms of security, the technique that they are based on, protocols that the presented protocol has been compared with, and finally, the method of verifying the protocol. Important points of the comparisons were collected in two tables.
引用
收藏
页码:961 / 974
页数:14
相关论文
共 154 条
[51]  
HanataniI Y., 2012, Financial Cryptography and Data Security, P70, DOI [10.1007/978- 3-642- 29889-9 7, DOI 10.1007/978-3-642-29889-97]
[52]   SLAP: Succinct and Lightweight Authentication Protocol for low-cost RFID system [J].
Luo, Hanguang ;
Wen, Guangjun ;
Su, Jian ;
Huang, Zhong .
WIRELESS NETWORKS, 2018, 24 (01) :69-78
[53]   Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol [J].
He, Debiao ;
Kumar, Neeraj ;
Chilamkurti, Naveen ;
Lee, Jong-Hyouk .
JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (10)
[54]  
He L., 2009, J BIOMED NANOTECHNOL, V5, P1
[55]  
Henrici D, 2004, SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, P149
[56]   Providing Security and Privacy in RFID Systems Using Triggered Hash Chains [J].
Henrici, Dirk ;
Mueller, Paul .
2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, :50-59
[57]  
Hernandez-Castro J. C., 2009, INT WORKSH COD CRYPT
[58]  
Hopper N.J., 2001, Advances in Cryptology - ASIACRYPT 2001, P52, DOI DOI 10.1007/3-540-45682-1
[59]   An Ultralightweight Mutual Authentication Protocol for EPC C1G2 RFID Tags [J].
Huang, Yu-Chung ;
Jiang, Jehn-Ruey .
2012 FIFTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP), 2012, :133-140
[60]  
Hwang R J., 2010, Journal of Computer Science, V21, P18