Abstract
This work addresses the critical problem of authentication in RFID. It describes a new lightweight scheme for mutual authentication between readers and tags that fulfills the EPCGen2 standard and all practical requirements of low-cost RFID such as resource limitation of tags and minimal interaction between tags and readers. Furthermore, the proposal does not rely on RFID readers as they are portable, and instead of that, it bases its security on trust in the back-end server because all shared secrets are stored only by the tag and the back-end server, with no possible access by the reader at any time.
Research supported by the Ministerio de Ciencia e Innovación and the European FEDER Fund under Project TIN2008-02236/TSI, and the FPI scholarship BES-2009-016774, and by the Agencia Canaria de Investigación, Innovación y Sociedad de la Información under PI2007/005 Project and FPI scholarship BOC Number 60.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Alien Technology (2004) EPCglobal Class 1 Gen 2: RFID Specification
Avoine, G.: (2010), http://www.avoine.net/rfid/
Burmester, M., Van Le, T., de Medeiros, B.: Towards provable security for ubiquitous applications. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 295–312. Springer, Heidelberg (2006)
Burmester, M., Munilla, J.: A Flyweight RFID Authentication Protocol. In: RFIDSec 2009 The 5th Workshop on RFID Security. Leuven, Belgium (2009)
Caballero-Gil, P., Fúster-Sabater, A.: Improvement of the edit distance attack to clock-controlled LFSR-based stream ciphers. In: Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds.) EUROCAST 2005. LNCS, vol. 3643, pp. 355–364. Springer, Heidelberg (2005)
Chen, C.L., Deng, Y.Y.: Conformation of EPC Class 1 Generation 2 Standards RFID System with Mutual Authentication and Privacy Protection. Engineering Applications of Artificial Intelligence (2009)
Chien, H.Y., Chen, C.W.: A lightweight authentication protocol for low-cost RFID. In: Proceedings of the 2nd Workshop on RFID Security (2006)
Chien, H.Y., Chen, C.H.: Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards. In: Computer Standards and Interfaces, vol. 29. Elsevier, Amsterdam (2007)
Choi, E.Y., Lee, D.H., Lim, J.I.: Anti-cloning Protocol Suitable to EPCglobal Class-1 Generation-2 RFID system. Computer Standards & Interfaces 31(6) (2009)
Cole, P.H., Ranasinghe, D.C.: Networked RFID System and Lightweight Cryptography. Springer, Heidelberg (2008)
EPCglobal. EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860-960 MHz. Tech. report (2007), http://www.epcglobalinc.org/standards/
EPCglobal Architecture Framework EPCglobal Final Version 1.3, (1673) (2009), http://www.epcglobalinc.org
Eun Young Choi, D.H.L., Lim, J.I.: Anti-cloning protocol suitable to epcglobal class-1 generation-2 rfid systems. Computer Standards & Interfaces 31(6), 1124–1130 (2009)
Fúster-Sabater, A., Caballero-Gil, P.: Linear solutions for cryptographic nonlinear sequence generators. Physics Letters A 369(5-6), 432–437 (2007)
Jin, B., Zhao, X., Long, Z., Qi, F., Yu, S.: Effective and Efficient Event Dissemination for RFID Applications. The Computer Journal 52(8) (2009)
Juels, A.: Strengthening EPC tags against cloning. In: ACM-Workshop on Wireless Security, WiSE (2005)
Juels, A.: RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications 24(2), 381–394 (2006)
Koscher, K., Juels, A., Kohno, T., Brajkovic, V.: EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond (2008)
Lehtonen, M., Ostojic, D., Ilic, A., Michahelles, F.: Securing RFID systems by detecting tag cloning. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 291–308. Springer, Heidelberg (2009)
Li, Y.Z., Cho, Y.B., Um, N.K., Lee, S.H.: Security and privacy on authentication protocol for low-cost RFID. In: IEEE International Conference on Computational Intelligence and Security (2006)
Song, B., Mitchell, C.J.: RFID Authentication Protocol for Low-cost Tags. In: WiSec 2008, Alexandria, Virginia, USA (2008)
Tsudik, G.: The Grid: YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In: Pervasive Computing and Communications Workshops (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Caballero-Gil, C., Caballero-Gil, P., Peinado-Domínguez, A., Molina-Gil, J. (2012). Lightweight Authentication for RFID Used in VANETs. In: Moreno-Díaz, R., Pichler, F., Quesada-Arencibia, A. (eds) Computer Aided Systems Theory – EUROCAST 2011. EUROCAST 2011. Lecture Notes in Computer Science, vol 6928. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27579-1_64
Download citation
DOI: https://doi.org/10.1007/978-3-642-27579-1_64
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27578-4
Online ISBN: 978-3-642-27579-1
eBook Packages: Computer ScienceComputer Science (R0)