On a Lightweight Authentication Protocol for RFID

被引:0
作者
Nastase, George-Daniel [1 ]
Tiplea, Ferucio Laurentiu [1 ]
机构
[1] Alexandru Ioan Cuza Univ, Dept Comp Sci, Iasi 700506, Romania
来源
INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS | 2015年 / 9522卷
关键词
CRYPTOGRAPHY; SECURITY;
D O I
10.1007/978-3-319-27179-8_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper focuses on the lightweight mutual authentication protocol for RFID systems proposed in [7]. The randomness of the non-linear feedback shift register sequences used in the protocol is reconsidered, a new technique for generated better such sequences is proposed, and the security and privacy of the protocol is formally argued.
引用
收藏
页码:212 / 225
页数:14
相关论文
共 32 条
[1]  
[Anonymous], 2010, REAL PRIV MAN RPM CR
[2]  
[Anonymous], 2008, P 2008 ACM S INFORM
[3]   A scalable and provably secure hash-based RFID protocol [J].
Avoine, G ;
Oechslin, P .
Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, :110-114
[4]   Public-key cryptography for RFID-tags [J].
Batina, L. ;
Guajardo, J. ;
Kerins, T. ;
Mentens, N. ;
Tuyls, P. ;
Verbauwhede, I. .
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, :217-+
[5]  
Batina L., 2006, An Elliptic Curve Processor Suitable For RFID-Tags
[6]  
Burmester M, 2008, LECT NOTES COMPUT SC, V5037, P490, DOI 10.1007/978-3-540-68914-0_30
[7]   A Lightweight Authentication Protocol for Low-Cost RFID [J].
Chien, Hung-Yu ;
Huang, Chen-Wei .
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2010, 59 (01) :95-102
[8]  
Feldhofer M, 2004, LECT NOTES COMPUT SC, V3156, P357
[9]  
Henrici D, 2004, SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, P149
[10]   Proper RFID Privacy: Model and Protocols [J].
Hermans, Jens ;
Peeters, Roel ;
Preneel, Bart .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (12) :2888-2902