Design and Analysis of a Low Cost Multiple-Secret-Key RFID Security Protocol

被引:0
作者
Gao, Lijun [1 ,3 ]
Ma, Maode [2 ]
Shu, Yantai [3 ]
Liu, Chunfeng [3 ]
机构
[1] Shenyang Aerosp Univ, Dept Comp Sci & Technol, Shenyang, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore, Singapore
[3] Tianjin Univ, Sch Comp Sci & Technol, Tianjin, Peoples R China
来源
2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4 | 2012年
关键词
RFID; Security; XOR operation on large integers; multiple solution equations;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Radio Frequency Identification (RFID) will become one of the most widely used devices in the near future. However, the major barrier that the RFID systems are facing presently is the issue of security. In this paper, we propose a low-cost multiple-secret-key RFID authentication protocol based on the XOR operation on large integers and multiple solution equations. The proposed protocol can achieve major security requirements in the deployment of the RFID systems with ability to prevent eavesdropping attacks, spoofing attacks, cloning attacks, and encryption algorithm explaining attacks.
引用
收藏
页码:914 / 917
页数:4
相关论文
共 50 条
[31]   SLAP: Succinct and Lightweight Authentication Protocol for low-cost RFID system [J].
Luo, Hanguang ;
Wen, Guangjun ;
Su, Jian ;
Huang, Zhong .
WIRELESS NETWORKS, 2018, 24 (01) :69-78
[32]   Pitfalls in an Ultra-lightweight Authentication Protocol for Low-cost RFID [J].
Chen, Chien-Ming ;
Pan, Jeng-Shyang ;
Tso, Raylin ;
Huang, Szu-Wei ;
Wu, Mu-En .
2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, :634-637
[33]   A New Ultralightweight RFID Authentication Protocol for Passive Low Cost Tags: KMAP [J].
Mujahid, Umar ;
Najam-ul-Islam, Muhammad ;
Sarwar, Shahzad .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (03) :725-744
[34]   SLAP: Succinct and Lightweight Authentication Protocol for low-cost RFID system [J].
Hanguang Luo ;
Guangjun Wen ;
Jian Su ;
Zhong Huang .
Wireless Networks, 2018, 24 :69-78
[35]   Security Analysis of a Mutual Authentication Protocol for RFID Systems [J].
Yang, Yuanyuan ;
Lu, Zhen ;
Chen, Zhuo ;
Wei, Xiang ;
Gu, Jian .
PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, :252-255
[36]   Minimize the Secret Storeage - A New Economical Scheme for Identifing Low-cost RFID Tags [J].
Li, Tong-liang ;
Jin, Zhi-gang ;
Si, Xiao-kun .
2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
[37]   A Design of Authentication Protocol for Multi-key RFID Tag [J].
Kim, Jiyeon ;
Jung, Jongjin ;
Ko, Hoon ;
Ki, Boyeon ;
Joe, Susan ;
Lee, Yongjun ;
Chang, Yunseok ;
Lee, Kyoonha .
ADVANCES IN WEB AND NETWORK TECHNOLOGIES, AND INFORMATION MANAGEMENT, PROCEEDINGS, 2007, 4537 :644-+
[38]   A One-way Hash based Low-cost Authentication Protocol with Forward Security in RFID System [J].
He Lei ;
Lu Xin-mei ;
Jin Song-he ;
Cai Zeng-yu .
2010 2ND INTERNATIONAL ASIA CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS (CAR 2010), VOL 2, 2010, :269-272
[39]   A Novel RFID Authentication Protocol for Low-Cost Tags [J].
Wu, Dan ;
Chen, Geng .
INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, :43-46
[40]   ECC-based lightweight authentication protocol with untraceability for low-cost RFID [J].
Chien, Hung-Yu ;
Laih, Chi-Sung .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2009, 69 (10) :848-853