Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm

被引:0
|
作者
Lijun Gao
Lu Zhang
Maode Ma
机构
[1] Shenyang Aerospace University,Department of Computer Science and Technology
[2] Nanyang Technological University,School of Electrical and Electronic Engineering
来源
Wireless Personal Communications | 2017年 / 96卷
关键词
RFID; Rabin encryption algorithm; Low-cost; Security authentication protocol;
D O I
暂无
中图分类号
学科分类号
摘要
Research shows that heavy-weighted RFID authentication protocol is weak to adapt to low-cost RFID tags because of the usage of public key Encryption Algorithm. The lightweight authentication protocol is suitable for low-cost RFID security authentication protocol because it adopts only the operation of AND, OR, XOR and shift, etc., but is hard to resist complex attacks. In this article, we use the features of the Rabin public key cryptography algorithm, which verifies that the signature process requires only low-cost square multiplication and modulo operations. Based on this, an RFID security authentication protocol with Rabin encryption algorithm is designed. The protocol improves the security of low-cost RFID tags to the height of the public key cryptosystem, and greatly increasing the security of low-cost RFID.
引用
收藏
页码:683 / 696
页数:13
相关论文
共 50 条
  • [21] An authenticated encryption based grouping proof protocol for RFID systems
    Rostampour, Samad
    Bagheri, Nasour
    Hosseinzadeh, Mehdi
    Khademzadeh, Ahmad
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5581 - 5590
  • [22] Security analysis and review of digital signature-based low-cost RFID tag authentication
    Vaisanen, Teemu
    Ritamaki, Matti
    Scholliers, Johan
    Toivonen, Sirra
    INTERNATIONAL JOURNAL OF RF TECHNOLOGIES-RESEARCH AND APPLICATIONS, 2014, 6 (01) : 31 - 49
  • [23] A Lightweight Authentication Protocol for Low-Cost RFID
    Chien, Hung-Yu
    Huang, Chen-Wei
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2010, 59 (01): : 95 - 102
  • [24] A Revised One-way Hash based Low-cost Authentication Protocol In RFID System
    Jiang Zhi-wei
    Shao Xiao-yan
    He Lei
    Zhang Tao
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3774 - +
  • [25] Cryptanalysis of AN RFID Ownership Transfer Protocol Based on Cloud On Security of AN RFID Ownership Transfer Protocol Based on Cloud
    Lee, Cheng-Chi
    Chen, Shun-Der
    Li, Chun-Ta
    Cheng, Chung-Lun
    Lai, Yan-Ming
    2018 5TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2018) / 2018 4TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2018), 2018, : 134 - 139
  • [26] Authentication Protocol of RFID System Based on Security Policy
    Wang, Guichao
    Wang, Yan
    Li, Yongzhen
    2013 THIRD INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2013, : 1242 - 1246
  • [27] Elliptic Curve Signcryption Based Security Protocol for RFID
    Singh, Anuj Kumar
    Patro, B. D. K.
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 344 - 365
  • [28] A Security RFID Authentication Protocol Based on Hash Function
    Yu Tian-tian
    Feng Quan-yuan
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 804 - 807
  • [29] A Low-cost PKC-based RFID Authentication Protocol and Its Implementation
    Wei, Lili
    Luo, Zhaotong
    Qu, Qiang
    He, Qing
    Xu, Jingwei
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 415 - 419
  • [30] Cryptographic Algorithm Approach for Low Cost RFID Systems
    Labbi, Zouheir
    Maarof, Ahmed
    Senhadji, Mohamed
    Belkasmi, Mostafa
    PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015, VOL 1, 2016, 380 : 45 - 54