Design and Analysis of a Low Cost Multiple-Secret-Key RFID Security Protocol

被引:0
|
作者
Gao, Lijun [1 ,3 ]
Ma, Maode [2 ]
Shu, Yantai [3 ]
Liu, Chunfeng [3 ]
机构
[1] Shenyang Aerosp Univ, Dept Comp Sci & Technol, Shenyang, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore, Singapore
[3] Tianjin Univ, Sch Comp Sci & Technol, Tianjin, Peoples R China
来源
2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4 | 2012年
关键词
RFID; Security; XOR operation on large integers; multiple solution equations;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Radio Frequency Identification (RFID) will become one of the most widely used devices in the near future. However, the major barrier that the RFID systems are facing presently is the issue of security. In this paper, we propose a low-cost multiple-secret-key RFID authentication protocol based on the XOR operation on large integers and multiple solution equations. The proposed protocol can achieve major security requirements in the deployment of the RFID systems with ability to prevent eavesdropping attacks, spoofing attacks, cloning attacks, and encryption algorithm explaining attacks.
引用
收藏
页码:914 / 917
页数:4
相关论文
共 50 条
  • [1] Design of a Security Protocol for Low-cost RFID
    Xu, Yuanzhong
    He, Zhangqing
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [2] Double verification protocol via secret sharing for low-cost RFID tags
    Liu, Y.
    Ezerman, M. F.
    Wang, H.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 90 (118-128): : 118 - 128
  • [3] Design and Implementation of A RFID Security Authentication Protocol
    Zhang, Lei
    Xiao, Zicong
    2013 2ND INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION AND MEASUREMENT, SENSOR NETWORK AND AUTOMATION (IMSNA), 2013, : 102 - 105
  • [4] RFID Authentication Protocol for Low-cost RFID Tags
    Kang, BooJoong
    Kim, Hye Seon
    Kim, Eui-Hyung
    Kim, Hyong-Shik
    Im, Eul Gyu
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (06): : 2041 - 2060
  • [5] Security Analysis of the Song-Mitchell Authentication Protocol for Low-cost RFID Tags
    Rizomiliotis, Panagiotis
    Rekleitis, Evangelos
    Gritzalis, Stefanos
    IEEE COMMUNICATIONS LETTERS, 2009, 13 (04) : 274 - 276
  • [6] Research on Multiple security authentication protocol in RFID System
    Xia, Hui
    FRONTIERS OF MECHANICAL ENGINEERING AND MATERIALS ENGINEERING II, PTS 1 AND 2, 2014, 457-458 : 770 - 773
  • [7] Study on security protocol analysis and design technology for RFID system
    Yang, Pengpeng
    Cui, Baojiang
    Wang, Ziyue
    Liang, Xiaobing
    Fu, Yilun
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 416 - 419
  • [8] Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm
    Lijun Gao
    Lu Zhang
    Maode Ma
    Wireless Personal Communications, 2017, 96 : 683 - 696
  • [9] A Kind of Effective Protection of Privacy and Low Cost RFID Security Authentication Protocol
    Fu, Tian
    Wang, Zhen
    Yang, PanDeng
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 1882 - 1886
  • [10] Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm
    Gao, Lijun
    Zhang, Lu
    Ma, Maode
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 683 - 696