Skip to main content

Lightweight Authentication for RFID Used in VANETs

  • Conference paper
Computer Aided Systems Theory – EUROCAST 2011 (EUROCAST 2011)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6928))

Included in the following conference series:

  • 2574 Accesses

Abstract

This work addresses the critical problem of authentication in RFID. It describes a new lightweight scheme for mutual authentication between readers and tags that fulfills the EPCGen2 standard and all practical requirements of low-cost RFID such as resource limitation of tags and minimal interaction between tags and readers. Furthermore, the proposal does not rely on RFID readers as they are portable, and instead of that, it bases its security on trust in the back-end server because all shared secrets are stored only by the tag and the back-end server, with no possible access by the reader at any time.

Research supported by the Ministerio de Ciencia e Innovación and the European FEDER Fund under Project TIN2008-02236/TSI, and the FPI scholarship BES-2009-016774, and by the Agencia Canaria de Investigación, Innovación y Sociedad de la Información under PI2007/005 Project and FPI scholarship BOC Number 60.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Alien Technology (2004) EPCglobal Class 1 Gen 2: RFID Specification

    Google Scholar 

  2. Avoine, G.: (2010), http://www.avoine.net/rfid/

  3. Burmester, M., Van Le, T., de Medeiros, B.: Towards provable security for ubiquitous applications. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 295–312. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Burmester, M., Munilla, J.: A Flyweight RFID Authentication Protocol. In: RFIDSec 2009 The 5th Workshop on RFID Security. Leuven, Belgium (2009)

    Google Scholar 

  5. Caballero-Gil, P., Fúster-Sabater, A.: Improvement of the edit distance attack to clock-controlled LFSR-based stream ciphers. In: Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds.) EUROCAST 2005. LNCS, vol. 3643, pp. 355–364. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  6. Chen, C.L., Deng, Y.Y.: Conformation of EPC Class 1 Generation 2 Standards RFID System with Mutual Authentication and Privacy Protection. Engineering Applications of Artificial Intelligence (2009)

    Google Scholar 

  7. Chien, H.Y., Chen, C.W.: A lightweight authentication protocol for low-cost RFID. In: Proceedings of the 2nd Workshop on RFID Security (2006)

    Google Scholar 

  8. Chien, H.Y., Chen, C.H.: Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards. In: Computer Standards and Interfaces, vol. 29. Elsevier, Amsterdam (2007)

    Google Scholar 

  9. Choi, E.Y., Lee, D.H., Lim, J.I.: Anti-cloning Protocol Suitable to EPCglobal Class-1 Generation-2 RFID system. Computer Standards & Interfaces 31(6) (2009)

    Google Scholar 

  10. Cole, P.H., Ranasinghe, D.C.: Networked RFID System and Lightweight Cryptography. Springer, Heidelberg (2008)

    Book  Google Scholar 

  11. EPCglobal. EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860-960 MHz. Tech. report (2007), http://www.epcglobalinc.org/standards/

  12. EPCglobal Architecture Framework EPCglobal Final Version 1.3, (1673) (2009), http://www.epcglobalinc.org

  13. Eun Young Choi, D.H.L., Lim, J.I.: Anti-cloning protocol suitable to epcglobal class-1 generation-2 rfid systems. Computer Standards & Interfaces 31(6), 1124–1130 (2009)

    Article  Google Scholar 

  14. Fúster-Sabater, A., Caballero-Gil, P.: Linear solutions for cryptographic nonlinear sequence generators. Physics Letters A 369(5-6), 432–437 (2007)

    Article  MATH  Google Scholar 

  15. Jin, B., Zhao, X., Long, Z., Qi, F., Yu, S.: Effective and Efficient Event Dissemination for RFID Applications. The Computer Journal 52(8) (2009)

    Google Scholar 

  16. Juels, A.: Strengthening EPC tags against cloning. In: ACM-Workshop on Wireless Security, WiSE (2005)

    Google Scholar 

  17. Juels, A.: RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications 24(2), 381–394 (2006)

    Article  MathSciNet  Google Scholar 

  18. Koscher, K., Juels, A., Kohno, T., Brajkovic, V.: EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond (2008)

    Google Scholar 

  19. Lehtonen, M., Ostojic, D., Ilic, A., Michahelles, F.: Securing RFID systems by detecting tag cloning. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 291–308. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  20. Li, Y.Z., Cho, Y.B., Um, N.K., Lee, S.H.: Security and privacy on authentication protocol for low-cost RFID. In: IEEE International Conference on Computational Intelligence and Security (2006)

    Google Scholar 

  21. Song, B., Mitchell, C.J.: RFID Authentication Protocol for Low-cost Tags. In: WiSec 2008, Alexandria, Virginia, USA (2008)

    Google Scholar 

  22. Tsudik, G.: The Grid: YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In: Pervasive Computing and Communications Workshops (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Roberto Moreno-Díaz Franz Pichler Alexis Quesada-Arencibia

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Caballero-Gil, C., Caballero-Gil, P., Peinado-Domínguez, A., Molina-Gil, J. (2012). Lightweight Authentication for RFID Used in VANETs. In: Moreno-Díaz, R., Pichler, F., Quesada-Arencibia, A. (eds) Computer Aided Systems Theory – EUROCAST 2011. EUROCAST 2011. Lecture Notes in Computer Science, vol 6928. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27579-1_64

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27579-1_64

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27578-4

  • Online ISBN: 978-3-642-27579-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics