ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device

被引:1
作者
Fan, Kai [1 ]
Ge, Nan [1 ]
Gong, Yuanyuan [1 ]
Li, Hui [1 ]
Su, Ruidan [2 ]
Yang, Yintang [3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
[3] Xidian Univ, Minist Educ Wide Band Gap Semicond Mat & Devices, Key Lab, Xian 710071, Peoples R China
来源
WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS | 2015年 / 9204卷
关键词
Ultra-lightweight; RFID; Authentication; Sub-key; Timestamp; PROTOCOL; SECURITY; SASI;
D O I
10.1007/978-3-319-21837-3_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RFID is widely used on mobile devices and makes it possible to take advantage of RFID system to complete mobile payment or merchandise information reading. However, the widespread use of RFID tags brings the possibility for various security risks and privacy problems. In addition, the storage space, processing capability and power supply of RFID tags are limited. In this paper, in order to reduce the computational cost we present an ultra-lightweight RFID authentication scheme, named ULRAS. ULRAS only uses Bit and XOR operations to prevent the DDOS attack. ULRAS uses sub-key and sub-index number into its key update process to achieve the forward security. Compared to the SASI protocol and the Gossamer protocol, ULRAS cost less computation and communication resources and have stronger security.
引用
收藏
页码:114 / 122
页数:9
相关论文
共 11 条
[1]  
[Anonymous], 2013 22 INT C COMP C, DOI DOI 10.1109/ICCCN.2013.6614192
[2]   Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol [J].
Bilal, Zeeshan ;
Masood, Ashraf ;
Kausar, Firdous .
2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS, 2009, :260-267
[3]   Security Analysis of the SASI Protocol [J].
Cao, Tianjie ;
Bertino, Elisa ;
Lei, Hong .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (01) :73-77
[4]   SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity [J].
Chien, Hung-Yu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (04) :337-340
[5]  
Engberg StephanJ., 2004, PST, P89
[6]  
Feldhofer M, 2004, P MEC 2004, P59
[7]   RFID security and privacy: A research survey [J].
Juels, A .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :381-394
[8]  
Peris-Lopez P, 2009, LECT NOTES COMPUT SC, V5379, P56
[9]  
Rhee K, 2005, LECT NOTES COMPUT SC, V3450, P70
[10]  
Saito J, 2005, AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, P621