Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm

被引:0
|
作者
Lijun Gao
Lu Zhang
Maode Ma
机构
[1] Shenyang Aerospace University,Department of Computer Science and Technology
[2] Nanyang Technological University,School of Electrical and Electronic Engineering
来源
Wireless Personal Communications | 2017年 / 96卷
关键词
RFID; Rabin encryption algorithm; Low-cost; Security authentication protocol;
D O I
暂无
中图分类号
学科分类号
摘要
Research shows that heavy-weighted RFID authentication protocol is weak to adapt to low-cost RFID tags because of the usage of public key Encryption Algorithm. The lightweight authentication protocol is suitable for low-cost RFID security authentication protocol because it adopts only the operation of AND, OR, XOR and shift, etc., but is hard to resist complex attacks. In this article, we use the features of the Rabin public key cryptography algorithm, which verifies that the signature process requires only low-cost square multiplication and modulo operations. Based on this, an RFID security authentication protocol with Rabin encryption algorithm is designed. The protocol improves the security of low-cost RFID tags to the height of the public key cryptosystem, and greatly increasing the security of low-cost RFID.
引用
收藏
页码:683 / 696
页数:13
相关论文
共 50 条
  • [31] ECC-based lightweight authentication protocol with untraceability for low-cost RFID
    Chien, Hung-Yu
    Laih, Chi-Sung
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2009, 69 (10) : 848 - 853
  • [32] Security Analysis of Ultra-lightweight Protocol for Low-Cost RFID Tags: SSL-MAP
    Kianersi, Mehrdad
    Gardeshi, Mahmoud
    Yousefi, Hamed
    RECENT TRENDS IN WIRELESS AND MOBILE NETWORKS, 2011, 162 : 236 - 245
  • [33] An Efficient and Secure Protocol for Low-cost RFID Systems
    Zhao, Feng
    Li, Huiyun
    Yu, Fengqi
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 51 - 54
  • [34] An efficient authentication protocol for low-cost RFID systems
    Jin, Zhen-Ai
    Cho, Hyun-Ju
    Yoo, Kee-Young
    AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2007, 4496 : 999 - +
  • [35] A secure RFID protocol based on insubvertible encryption using guardian proxy
    Osaka, Kyosuke
    Chang, Shuang
    Takagi, Tsuyoshi
    Yamazaki, Kenichi
    Takahashi, Osamu
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 733 - +
  • [36] Double verification protocol via secret sharing for low-cost RFID tags
    Liu, Y.
    Ezerman, M. F.
    Wang, H.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 90 (118-128): : 118 - 128
  • [37] Hybrid Encryption Approach Using Dynamic Key Generation and Symmetric Key Algorithm for RFID Systems
    Labbi, Zouheir
    Maarof, Ahmed
    Senhadji, Mohamed
    Belkasmi, Mostafa
    NETWORKED SYSTEMS, NETYS 2016, 2016, 9944 : 244 - 249
  • [38] A security protocol of RFID communication system based on password authenticated with provable security
    Li, Kun
    Liu, Jichao
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2021, 14 (1-2) : 64 - 82
  • [39] Mutual Authentication Security RFID Protocol Based on Time Stamp
    Zhang, Changlun
    Zhang, Wenqi
    Mu, Haibing
    2015 FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE THEORY, SYSTEMS AND APPLICATIONS (CCITSA 2015), 2015, : 166 - 170
  • [40] ID Updating-Based RFID Mutual Authentication Protocol for Low-Cost Tags
    Li Jian
    Song Danjie
    Guo Xiaojing
    Xie Feng
    Peng Yong
    CHINA COMMUNICATIONS, 2011, 8 (07) : 122 - 127