Abstract
This paper focuses on the lightweight mutual authentication protocol for RFID systems proposed in [7]. The randomness of the non-linear feedback shift register sequences used in the protocol is reconsidered, a new technique for generated better such sequences is proposed, and the security and privacy of the protocol is formally argued.
F.L. Ţiplea — Author partially supported by the Romanian National Authority for Scientific Research (CNCS-UEFISCDI) under the project PN-II-PT-PCCA-2013-4-1651.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Avoine, G., Oechslin, P.: A scalable and provably secure hash-based RFID protocol. In: Third IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 110–114, March 2005
Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: An elliptic curve processor suitable for RFID-tags (2006)
Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: Public-key cryptography for RFID-tags. In: Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 217–222. IEEE Computer Society, Washington, DC, USA (2007)
Burmester, M., de Medeiros, B.: The security of EPC Gen2 compliant RFID protocols. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 490–506. Springer, Heidelberg (2008)
Chien, H.-Y., Huang, C.-W.: Security of ultra-lightweight RFID authentication protocols and its improvements. SIGOPS Oper. Syst. Rev. 41(4), 83–86 (2007)
Chien, H.-Y., Huang, C.-W.: A lightweight authentication protocol for low-cost RFID. J. Signal Process. Syst. 59(1), 95–102 (2010)
Ţiplea, F.L.: A lightweight authentication protocol for RFID. In: Kotulski, Z., Ksiopolski, B., Mazur, K. (eds.) CSS 2014. CCIS, vol. 448, pp. 110–121. Springer, Heidelberg (2014)
Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357–370. Springer, Heidelberg (2004)
Henrici, D., Muller, P.: Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 149–153, March 2004
Hermans, J., Peeters, R., Preneel, B.: Proper RFID privacy: model and protocols. IEEE Trans. Mobile Comput. 13(12), 2888–2902 (2014)
Juels, A.: Minimalist cryptography for low-cost RFID tags (Extended Abstract). In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 149–164. Springer, Heidelberg (2005)
Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293–308. Springer, Heidelberg (2005)
Kardaş, S., Çelik, S., Arslan, A., Levi, A.: An efficient and private RFID authentication protocol supporting ownership transfer. In: Avoine, G., Kara, O. (eds.) LightSec 2013. LNCS, vol. 8162, pp. 130–141. Springer, Heidelberg (2013)
Lee, Y.K., Sakiyama, K., Batina, L., Verbauwhede, I.: Elliptic-curve-based security processor for RFID. IEEE Trans. Comput. 57(11), 1514–1527 (2008)
Lim, C.H., Kwon, T.: Strong and robust RFID authentication enabling perfect ownership transfer. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 1–20. Springer, Heidelberg (2006)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to “privacy-friendly” tags. In: In RFID Privacy Workshop (2003)
Paise, R.I., Vaudenay, S.: Mutual authentication in RFID: security and privacy. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, pp. 292–299. ACM, New York, NY, USA (2008)
Pantelić, G., Bojanić, S., Tomašević, V.: Authentication protocols in RFID systems. In: Zhang, Y., Kitsos, P., (eds.) Security in RFID and Sensor Networks, pp. 99–120. Auerbach Publications, April 2009
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: EMAP: an efficient mutual-authentication protocol for low-cost RFID tags. In: Meersman, R., Tari, Z., Herrero, P. (eds.) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. LNCS, vol. 4277, pp. 352–361. Springer, Heidelberg (2006)
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: M\(^{2}\)AP: A minimalist mutual-authentication protocol for low-cost RFID tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol. 4159, pp. 912–923. Springer, Heidelberg (2006)
Peris-Lopez, P., Hernandez-Castro, J.C., Tapiador, J.M.E., Ribagorda, A.: Advances in ultralightweight cryptography for low-cost RFID tags: gossamer protocol. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol. 5379, pp. 56–68. Springer, Heidelberg (2009)
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Lightweight cryptography for low-cost RFID tags. In: Zhang, Y., Kitsos, P., (eds.) Security in RFID and Sensor Networks, pp. 121–150. Auerbach Publications, April 2009
Piramuthu, S.: Protocols for RFID tag/reader authentication. Decis. Support Syst. 43(3), 897–914 (2007)
Relevant Security Corp., Denver, Colorado, USA. Real Privacy Management\(^{TM}\) (RPM). Reference Guide Version 3.1 (2009)
Relevant Security Corp., Denver, Colorado, USA. Real Privacy Management\(^{TM}\) (RPM). Cryptographic Description Version 3.2 (2010)
Sherman, A.: An initial assessment of the 2factor authentication and key-management system, May 2005
Song, B., Mitchell, C.J.: RFID authentication protocol for low-cost tags. In: Proceedings of the First ACM Conference on Wireless Network Security, pp. 140–147. ACM, New York (2008)
Tanaka, H.: Security-function integrated simple cipher communication system. In: Proceedings of the 2006 Symposium on Cryptography and Information Security (2006)
Tanaka, H.: Generation of cryptographic random sequences and its applications to secure enchipering. In: Proceedings of the 2007 Symposium on Cryptography and Information Security (2007)
Vajda, I., Buttyn, L.: Lightweight authentication protocols for low-cost RFID tags. In: In Second Workshop on Security in Ubiquitous Computing Ubicomp 2003 (2003)
Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68–87. Springer, Heidelberg (2007)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Năstase, GD., Ţiplea, F.L. (2015). On a Lightweight Authentication Protocol for RFID. In: Bica, I., Naccache, D., Simion, E. (eds) Innovative Security Solutions for Information Technology and Communications. SECITC 2015. Lecture Notes in Computer Science(), vol 9522. Springer, Cham. https://doi.org/10.1007/978-3-319-27179-8_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-27179-8_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27178-1
Online ISBN: 978-3-319-27179-8
eBook Packages: Computer ScienceComputer Science (R0)