Protocols for RFID tag/reader authentication

被引:81
|
作者
Piramuthu, Selwyn [1 ]
机构
[1] Univ Florida, Gainesville, FL 32611 USA
关键词
REID; light-weight cryptography; secure authentication;
D O I
10.1016/j.dss.2007.01.003
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Radio-Frequency Identification (RFID) tags are poised to supplant barcodes in the very near future. Their information storage capacity as well as their ability to transfer information through contactless means without line-of-sight translates to significant advantage over barcodes. However, cost and privacy issues are major impediments to their widespread use. We consider the latter issue, specifically those that relate to securely authenticating RFID tags and readers. Light-weight authentication protocols are necessary in RFID applications due to tag-level constraints. Over the past few years, several streams of research have emerged approaching the RFID tag/reader privacy/security problem from different perspectives. We study and evaluate a few protocols from each of those streams, identify possible vulnerabilities, and provide alternate solutions when possible. We provide security analysis of the proposed solutions. (c) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:897 / 914
页数:18
相关论文
共 50 条
  • [41] Traceability Analysis of Recent RFID Authentication Protocols
    Alavi, Seyed Mohammad
    Baghery, Karim
    Abdolmaleki, Behzad
    Aref, Mohammad Reza
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 83 (03) : 1663 - 1682
  • [42] Untraceable and Serverless RFID Authentication and Search Protocols
    Kim, Zeen
    Kim, Jangseong
    Kim, Kwangjo
    Choi, Imsung
    Shon, Taeshik
    2011 NINTH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS WORKSHOPS (ISPAW), 2011, : 278 - 283
  • [43] On the Traceability of Tags in SUAP RFID Authentication Protocols
    Safkhani, Masoumeh
    Bagheri, Nasour
    Peris-Lopez, Pedro
    Mitrokotsa, Aikaterini
    2012 IEEE INTERNATIONAL CONFERENCE ON RFID-TECHNOLOGIES AND APPLICATIONS (RFID-TA), 2012,
  • [44] Study of the Privacy Models in RFID Authentication Protocols
    Shen, Jian
    Zheng, Wenying
    Wang, Jin
    Xia, Zhihua
    Fu, Zhangjie
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 345 - 353
  • [45] Secure ubiquitous authentication protocols for RFID systems
    Morshed, Md Monzur
    Atkins, Anthony
    Yu, Hongnian
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2012,
  • [46] Scalability and Security Conflict for RFID Authentication Protocols
    Imran Erguler
    Emin Anarim
    Wireless Personal Communications, 2011, 59 : 43 - 56
  • [47] Review of different classes of RFID authentication protocols
    Ibrahim, Alaauldin
    Dalkilic, Gokhan
    WIRELESS NETWORKS, 2019, 25 (03) : 961 - 974
  • [48] Untraceability Analysis of Two RFID Authentication Protocols
    Chen Xiuqing
    Cao Tianjie
    Zhai Jingxuan
    CHINESE JOURNAL OF ELECTRONICS, 2016, 25 (05) : 912 - 920
  • [49] Attacks on CKK family of RFID authentication protocols
    Golebiewski, Zbigniew
    Majcher, Krzysztof
    Zagorski, Filip
    AD-HOC, MOBILE AND WIRELESS NETWORKS, PROCEEDINGS, 2008, 5198 : 241 - +
  • [50] Universally Composable RFID Identification and Authentication Protocols
    Burmester, Mike
    Van Le, Tri
    De Medeiros, Breno
    Tsudik, Gene
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 12 (04)