Protocols for RFID tag/reader authentication

被引:81
|
作者
Piramuthu, Selwyn [1 ]
机构
[1] Univ Florida, Gainesville, FL 32611 USA
关键词
REID; light-weight cryptography; secure authentication;
D O I
10.1016/j.dss.2007.01.003
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Radio-Frequency Identification (RFID) tags are poised to supplant barcodes in the very near future. Their information storage capacity as well as their ability to transfer information through contactless means without line-of-sight translates to significant advantage over barcodes. However, cost and privacy issues are major impediments to their widespread use. We consider the latter issue, specifically those that relate to securely authenticating RFID tags and readers. Light-weight authentication protocols are necessary in RFID applications due to tag-level constraints. Over the past few years, several streams of research have emerged approaching the RFID tag/reader privacy/security problem from different perspectives. We study and evaluate a few protocols from each of those streams, identify possible vulnerabilities, and provide alternate solutions when possible. We provide security analysis of the proposed solutions. (c) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:897 / 914
页数:18
相关论文
共 50 条
  • [1] Ultralightweight RFID Reader-Tag Mutual Authentication
    Huang, Yu-Chung
    Jiang, Jehn-Ruey
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 613 - 616
  • [2] Using dummy data for RFID tag and reader authentication
    BahaAAlsaify
    Dale RThompson
    Abdallah Almaaitah
    Jia Di
    Digital Communications and Networks, 2022, 8 (05) : 804 - 813
  • [3] Using dummy data for RFID tag and reader authentication
    Alsaify, Baha A.
    Thompson, Dale R.
    Alma'aitah, Abdallah
    Di, Jia
    DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 8 (05) : 804 - 813
  • [4] An Efficient RFID Tag-Reader Mutual Authentication Scheme
    Zhang, Yansheng
    Li, Dancheng
    Zhu, Zhiliang
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 2942 - 2945
  • [5] Ultralightweight RFID Reader-Tag Mutual Authentication Revisited
    Huang, Yu-Chung
    Jiang, Jehn-Ruey
    2015 IEEE THIRD INTERNATIONAL CONFERENCE ON MOBILE SERVICES MS 2015, 2015, : 166 - 173
  • [6] An analysis of RFID tag authentication protocols using secret value
    Cho, Jung-Sik
    Yeo, Sang-Soo
    Kim, Sung Kwon
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, MAIN CONFERENCE PAPERS, VOL 1, 2007, : 481 - 486
  • [7] Addressing the weakness in a lightweight RFID tag-reader mutual authentication scheme
    Lim, T. L.
    Li, Tieyan
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 59 - 63
  • [8] Hardware implementation of tag-reader mutual authentication protocol for RFID systems
    Vijaykumar, V. R.
    Elango, S.
    INTEGRATION-THE VLSI JOURNAL, 2014, 47 (01) : 123 - 129
  • [9] New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing
    Ng, Ching Yu
    Susilo, Willy
    Mu, Yi
    Safavi-Naini, Rei
    COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS, 2009, 5789 : 321 - +
  • [10] An Authentication RFID Reader with FPGA
    Li, Hui
    Hou, Yibin
    Huang, Zhangqin
    He Fugui
    Rui, Chen
    2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 55 - 59