Skip to main content

A Security and Performance Evaluation of Hash-Based RFID Protocols

  • Conference paper
Information Security and Cryptology (Inscrypt 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5487))

Included in the following conference series:

Abstract

In this paper, we perform a security and performance evaluation on the various hash-based RFID identification and authentication protocols that have been proposed in the research literature. We compare the level of security offered by each of the schemes by examining whether they satisfy a set of security properties under a multi-level adversarial model. The security properties examined include tag anonymity, tag authenticity, reader authenticity, session unlinkability, forward secrecy, and desynchronization resilience. Furthermore, we also evaluate the performance of the schemes by examining the overhead, namely computational costs, storage memory requirements, and communication costs, incurred under the schemes. Finally, we provide a discussion on the insights gathered from our evaluation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Karthikeyan, S., Nesterenko, M.: RFID Security Without Extensive Cryptography. In: 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (2005)

    Google Scholar 

  2. Duc, D.N., Park, J., Lee, H., Kim, K.: Enhancing the Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning. In: Symposium on Cryptography and Information Security (2006)

    Google Scholar 

  3. Chien, H.Y., Chen, C.H.: Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards. Computers Standards & Interfaces 29(2), 254–259 (2007)

    Article  MathSciNet  Google Scholar 

  4. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez Tapiador, J.M., Ribgorda, A.: Cryptanalysis of a Novel Authentication Protocol Conforming to EPC-C1G2 Standard. In: Workshop on RFID Security (RFIDSec 2007) (2007)

    Google Scholar 

  5. Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357–370. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Feldhofer, M.: Comparing the Stream Ciphers Trivium and Grain for their Feasibility on RFID Tags. In: Proceedings of Austrochip 2007 (2007)

    Google Scholar 

  7. Hein, D., Wolkerstorfer, J., Felber, N.: ECC is Ready for RFID - A Proof in Silicon. In: 4th Workshop on RFID Security (RFIDSec) 2008 (2008)

    Google Scholar 

  8. O’Neill, M.: Low-Cost SHA-1 Hash Function Architecture for RFID Tags. In: 4th Workshop on RFID Security (RFIDSec) 2008 (2008)

    Google Scholar 

  9. Rolfes, C., Poschmann, A., Paar, C.: Security for 1000 Gate Equivalents. In: Secure Component and System Identification (SECSI) 2008 (2008)

    Google Scholar 

  10. Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to ‘Privacy-Friendly’ Tags. In: RFID Privacy Workshop. MIT, Cambridge (2003)

    Google Scholar 

  11. Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash Based RFID Protocol. In: Proceedings of the Int’l Workshop on Pervasive Computing and Communication Security (PerSec) 2005, pp. 110–114 (2005)

    Google Scholar 

  12. Dimitriou, T.: A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks. In: Proceedings of the IEEE Int’l Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm) 2005 (2005)

    Google Scholar 

  13. Tsudik, G.: YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In: Proceedings of the IEEE Int’l Conference on Pervasive Computing and Communications Workshops (PerComW) 2006, pp. 640–643 (2006)

    Google Scholar 

  14. Chatmon, C., van Le, T., Burmester, M.: Secure Anonymous RFID Authentication Protocols. Technical Report TR-060112, Florida State University, Computer Science Dept. (2006)

    Google Scholar 

  15. Dimitriou, T.: A Secure and Efficient RFID Protocol that could make Big Brother (partially) Obsolete. In: Proceedings of the 1st Int’l Conference on Pervasive Computing and Communications (PerCom) 2006, pp. 269–275 (2006)

    Google Scholar 

  16. Molnar, D., Wagner, D.: Privacy and Security in Library RFID Issues, Practices and Architectures. In: Proceedings of the ACM Conference on Computer and Communication Security (2004)

    Google Scholar 

  17. Lu, L., Han, J.S., Hu, L., Liu, Y.H., Ni, L.M.: Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems. In: Proceedings of the IEEE Int’l Conference on Pervasive Computing and Communications (PerCom) 2007 (2007)

    Google Scholar 

  18. Conti, M., Di Pietro, R., Mancini, L.V., Spognardi, A.: RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. In: Proceedings of the IEEE Int’l Conference on Pervasive Computing and Communications Workshops (PerComW) 2007, pp. 229–234 (2007)

    Google Scholar 

  19. Henrici, D., Muller, P.: Providing Security and Privacy in RFID Systems Using Triggered Hash Chains. In: Proceedings of the IEEE Int’l Conference on Pervasive Computing and Communications (PerCom) 2008, pp. 50–59 (2008)

    Google Scholar 

  20. Lim, T.-L., Li, T., Gu, T.: Secure RFID Identification and Authentication with Triggered Hash Chain Variants. In: Proceedings of the 14th Int’l Conference on Parallel and Distributed Systems (ICPADS) 2008 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lim, TL., Li, T., Li, Y. (2009). A Security and Performance Evaluation of Hash-Based RFID Protocols. In: Yung, M., Liu, P., Lin, D. (eds) Information Security and Cryptology. Inscrypt 2008. Lecture Notes in Computer Science, vol 5487. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01440-6_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-01440-6_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-01439-0

  • Online ISBN: 978-3-642-01440-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics