Skip to main content

On a Lightweight Authentication Protocol for RFID

  • Conference paper
  • First Online:
Innovative Security Solutions for Information Technology and Communications (SECITC 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9522))

Included in the following conference series:

  • 1223 Accesses

Abstract

This paper focuses on the lightweight mutual authentication protocol for RFID systems proposed in [7]. The randomness of the non-linear feedback shift register sequences used in the protocol is reconsidered, a new technique for generated better such sequences is proposed, and the security and privacy of the protocol is formally argued.

F.L. Ţiplea — Author partially supported by the Romanian National Authority for Scientific Research (CNCS-UEFISCDI) under the project PN-II-PT-PCCA-2013-4-1651.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Avoine, G., Oechslin, P.: A scalable and provably secure hash-based RFID protocol. In: Third IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 110–114, March 2005

    Google Scholar 

  2. Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: An elliptic curve processor suitable for RFID-tags (2006)

    Google Scholar 

  3. Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: Public-key cryptography for RFID-tags. In: Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 217–222. IEEE Computer Society, Washington, DC, USA (2007)

    Google Scholar 

  4. Burmester, M., de Medeiros, B.: The security of EPC Gen2 compliant RFID protocols. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 490–506. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. Chien, H.-Y., Huang, C.-W.: Security of ultra-lightweight RFID authentication protocols and its improvements. SIGOPS Oper. Syst. Rev. 41(4), 83–86 (2007)

    Article  Google Scholar 

  6. Chien, H.-Y., Huang, C.-W.: A lightweight authentication protocol for low-cost RFID. J. Signal Process. Syst. 59(1), 95–102 (2010)

    Article  Google Scholar 

  7. Ţiplea, F.L.: A lightweight authentication protocol for RFID. In: Kotulski, Z., Ksiopolski, B., Mazur, K. (eds.) CSS 2014. CCIS, vol. 448, pp. 110–121. Springer, Heidelberg (2014)

    Google Scholar 

  8. Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357–370. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Henrici, D., Muller, P.: Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 149–153, March 2004

    Google Scholar 

  10. Hermans, J., Peeters, R., Preneel, B.: Proper RFID privacy: model and protocols. IEEE Trans. Mobile Comput. 13(12), 2888–2902 (2014)

    Article  Google Scholar 

  11. Juels, A.: Minimalist cryptography for low-cost RFID tags (Extended Abstract). In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 149–164. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  12. Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293–308. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  13. Kardaş, S., Çelik, S., Arslan, A., Levi, A.: An efficient and private RFID authentication protocol supporting ownership transfer. In: Avoine, G., Kara, O. (eds.) LightSec 2013. LNCS, vol. 8162, pp. 130–141. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  14. Lee, Y.K., Sakiyama, K., Batina, L., Verbauwhede, I.: Elliptic-curve-based security processor for RFID. IEEE Trans. Comput. 57(11), 1514–1527 (2008)

    Article  MathSciNet  Google Scholar 

  15. Lim, C.H., Kwon, T.: Strong and robust RFID authentication enabling perfect ownership transfer. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 1–20. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  16. Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to “privacy-friendly” tags. In: In RFID Privacy Workshop (2003)

    Google Scholar 

  17. Paise, R.I., Vaudenay, S.: Mutual authentication in RFID: security and privacy. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, pp. 292–299. ACM, New York, NY, USA (2008)

    Google Scholar 

  18. Pantelić, G., Bojanić, S., Tomašević, V.: Authentication protocols in RFID systems. In: Zhang, Y., Kitsos, P., (eds.) Security in RFID and Sensor Networks, pp. 99–120. Auerbach Publications, April 2009

    Google Scholar 

  19. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: EMAP: an efficient mutual-authentication protocol for low-cost RFID tags. In: Meersman, R., Tari, Z., Herrero, P. (eds.) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. LNCS, vol. 4277, pp. 352–361. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  20. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: M\(^{2}\)AP: A minimalist mutual-authentication protocol for low-cost RFID tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol. 4159, pp. 912–923. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  21. Peris-Lopez, P., Hernandez-Castro, J.C., Tapiador, J.M.E., Ribagorda, A.: Advances in ultralightweight cryptography for low-cost RFID tags: gossamer protocol. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol. 5379, pp. 56–68. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  22. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Lightweight cryptography for low-cost RFID tags. In: Zhang, Y., Kitsos, P., (eds.) Security in RFID and Sensor Networks, pp. 121–150. Auerbach Publications, April 2009

    Google Scholar 

  23. Piramuthu, S.: Protocols for RFID tag/reader authentication. Decis. Support Syst. 43(3), 897–914 (2007)

    Article  Google Scholar 

  24. Relevant Security Corp., Denver, Colorado, USA. Real Privacy Management\(^{TM}\) (RPM). Reference Guide Version 3.1 (2009)

    Google Scholar 

  25. Relevant Security Corp., Denver, Colorado, USA. Real Privacy Management\(^{TM}\) (RPM). Cryptographic Description Version 3.2 (2010)

    Google Scholar 

  26. Sherman, A.: An initial assessment of the 2factor authentication and key-management system, May 2005

    Google Scholar 

  27. Song, B., Mitchell, C.J.: RFID authentication protocol for low-cost tags. In: Proceedings of the First ACM Conference on Wireless Network Security, pp. 140–147. ACM, New York (2008)

    Google Scholar 

  28. Tanaka, H.: Security-function integrated simple cipher communication system. In: Proceedings of the 2006 Symposium on Cryptography and Information Security (2006)

    Google Scholar 

  29. Tanaka, H.: Generation of cryptographic random sequences and its applications to secure enchipering. In: Proceedings of the 2007 Symposium on Cryptography and Information Security (2007)

    Google Scholar 

  30. Vajda, I., Buttyn, L.: Lightweight authentication protocols for low-cost RFID tags. In: In Second Workshop on Security in Ubiquitous Computing Ubicomp 2003 (2003)

    Google Scholar 

  31. Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68–87. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  32. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ferucio Laurenţiu Ţiplea .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Năstase, GD., Ţiplea, F.L. (2015). On a Lightweight Authentication Protocol for RFID. In: Bica, I., Naccache, D., Simion, E. (eds) Innovative Security Solutions for Information Technology and Communications. SECITC 2015. Lecture Notes in Computer Science(), vol 9522. Springer, Cham. https://doi.org/10.1007/978-3-319-27179-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27179-8_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27178-1

  • Online ISBN: 978-3-319-27179-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics