Abstract
Using RFID tags can simplify many applications and provide many benefits, but the privacy of the customers should be taken into account. A potential threat for the privacy of a user is that anonymous readers can obtain information about the tags in the system. In order to address the security issues of RFID systems, various schemes have been proposed. Among the various solutions, lightweight protocols have attracted much attention as they are more appropriate for the limited architecture of RFID tags. In this paper, we perform the security analysis of five lightweight protocols proposed in [1-4] and discuss their advantages and security issues. The computational complexity of these lightweight protocols are also compared in this work.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Henrici, D., Müller, P.: Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: IEEE PERCOM, pp. 149–153 (2004)
Lim, T.L., Li, T., Gu, T.: Secure RFID identification and authentication with triggered hash chain variants. In: IEEE ICPADS, pp. 583–590 (2008)
Tan, C.C., Sheng, B., Li, Q.: Secure and server-less RFID authentication and search protocols. IEEE Trans. on Wireless Communications 7, 1400–1407 (2008)
Sun, H.M., Ting, W.C.: A Gen2-based RFID authentication protocol for security and privacy. IEEE Trans. on Mobile Computing 8, 1052–1062 (2009)
Juels, A.: RFID security and privacy: A research survey. IEEE J. on Selected Areas in Communication 24, 381–394 (2006)
Langheinrich, M.: A survey of RFID privacy approaches. J. of Personal and Ubiquitous Computing 13, 413–421 (2009)
Vahedi, E., Shah-Mansouri, V., Wong, V., Blake, I.F.: A probabilistic approach for detecting blocking attack in RFID systems. In: IEEE ICC, pp. 101–107 (2010)
Avoine, G., Oechslin, P.: RFID traceability: A multi-layer problem. Financial Cryptography and Data Security 3570, 125–140 (2005)
Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24, 770–772 (1981)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Vahedi, E., Ward, R.K., Blake, I.F. (2011). Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols. In: Herrero, Á., Corchado, E. (eds) Computational Intelligence in Security for Information Systems. Lecture Notes in Computer Science, vol 6694. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21323-6_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-21323-6_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21322-9
Online ISBN: 978-3-642-21323-6
eBook Packages: Computer ScienceComputer Science (R0)