Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts

被引:23
作者
Armknecht, Frederik [1 ]
Hamann, Matthias [1 ]
Mikhalev, Vasily [1 ]
机构
[1] Univ Mannheim, D-68131 Mannheim, Germany
来源
RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, RFIDSEC 2014 | 2014年 / 8651卷
关键词
Lightweight authentication protocols; Low-cost RFIDs; Real world conditions; Learning parity with noise; HB-NUMBER; SECURITY; DEVICES; PRNG;
D O I
10.1007/978-3-319-13066-8_1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
While most lightweight authentication protocols have been well analyzed with respect to their security, often only little (or even nothing) is known with respect to their suitability for low-cost RFIDs in the range of $0.05 to $0.10. Probably this is mainly due to the fact that open literature rarely provides information on what conditions need to be met by a scheme in practice, hindering a sound development and analysis of schemes. We provide a comprehensive collection of several conditions that should be met by lightweight authentication schemes if deployed in low-cost RFID systems. Afterwards, we show that none of the existing authentication protocols that are based on the hardness of the Learning Parity with Noise (LPN) problem complies to these conditions, leaving the design of an LPN-based protocol for low-cost RFIDs as an open question.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 46 条
[1]  
Abyaneh M. R. S., 2010, Proceedings 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC 2010), P523, DOI 10.1109/EUC.2010.86
[2]  
[Anonymous], 2009044 CRYPT EPRINT
[3]   A 440-nA True Random Number Generator for Passive RFID Tags [J].
Balachandran, Ganesh K. ;
Barnett, Raymond E. .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2008, 55 (11) :3723-3732
[4]  
Bosley C., 2011, HB HB LIKE PROTOCOL, V2011, P350
[5]  
Bringer J., 2008, ARXIV08020603
[6]   HB++:: a lightweight authentication protocol secure against some attacks [J].
Bringer, Julien ;
Chabanne, Herve ;
Dottax, Emmanuelle .
SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, :28-+
[7]  
Cole P.H., 2008, Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
[8]  
Duc D.N., 2007, I EL INF COMM ENG S
[9]  
Feldhofer M., 2005, IEE Proceedings-Information Security, V152, P13, DOI 10.1049/ip-ifs:20055006
[10]  
Feldhofer M, 2004, LECT NOTES COMPUT SC, V3156, P357