Abstract
As low-cost RFIDs with limited resources will dominate most of the RFID market, it is imperative to design lightweight RFID authentication protocols for these low-cost RFIDs. However, most of existing RFID authentication protocols either suffer from some security weaknesses or require costly operations that are not available on low-cost tags. In this paper, we analyze the security vulnerabilities of a lightweight authentication protocol recently proposed by Li et al. (2006), and then propose a new lightweight protocol to improve the security and to reduce the computational cost for identifying a tag from O(n) to O(1).
Similar content being viewed by others
References
Henrici, D., & Müller, P. (2004). Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. PerSec04 at IEEE PerCom.
Lee, S. M., Hwang, Y. J., Lee, D. H., & Lim, J. I. (2005). Efficient authentication for low-cost RFID systems. International Conference on Computational Science and its Applications–ICCSA 2005.
Weis, S. A., Sarma, S. E., Rivest, R. L., & Engels, D. W. (2003). Security and privacy aspects of low-cost radio frequency identification systems. International Conference on Security in Pervasive Computing.
Li, Y. Z., Cho, Y. B., Um, N. K., & Lee, S. H. (2006). Security and privacy on authentication protocol for low-cost RFID. IEEE International Conference on Computational Intelligence and Security, volume 2, pp. 1101–1104.
Lee, Y. K., & Verbauwhede, I. (2005). Secure and low-cost RFID authentication protocols. 2nd IEEE International Workshop on Adaptive Wireless Networks (AWiN), November 2005.
Chien, H. Y., & Chen, C. H. (2007). Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standards & Interfaces, 29(2), 254–259. doi:10.1016/j.csi.2006.04.004.
Lin, C.-L., & Chang, G.-G. (2007). Cryptanalysis of EPC class 1 generation 2 RFID authentication. Information Security Conference 2007, ChiaYi, Taiwan.
Duc, D. N., Park, J., Lee, H., & Kim, K. (2006). Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning. The 2006 Symposium on Cryptography and Information Security.
Karthikeyan, S., & Nesterenko, M. (2005). RFID security without extensive cryptography. In Workshop on security of ad hoc and sensor networks (pp. 63–67). Alexandria, Virginia, USA: ACM.
Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2008). LAMED—A PRNG for EPC Class-1 Generation-2 RFID specification. Computers Standards and Interfaces. doi:10.1016/j.csi.2007.11.013.
EPCglobal Inc: UHF Class 1 Gen 2 Standard Version 1.1.0, 2007, http://www.epcglobalinc.org/standards/uhfc1g2/ (2007/10/20).
ISO/IEC FCD 15693-3. Identification cards–contactless integrated circuit cards–vicinity cards—Part 3: Anticollision and transmission protocol.
Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2006). LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. Proceedings of the 2nd Workshop on RFID Security, July 2006.
Chien, H. Y., & Huang, C. W. (2007). Security of ultra-lightweight RFID authentication protocols and its improvements. ACM Operating System Reviews, 41(Issue 4), 83–86.
Chien, H. Y. (2007). SASI: A new ultra-lightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(4), 337–340. doi:10.1109/TDSC.2007.70226.
D’Arco1, P., & Santis, A. D. (2008). Weaknesses in a recent ultra-lightweight RFID authentication protocol. AFRICACRYPT 2008, LNCS 5023, pp. 27–39. Berlin: Springer.
Acknowledgments
We sincerely appreciate the anonymous reviewers for providing us the valuable comments. This research is partially supported by National Science Council with project number NSC95-2221-E-260-050-MY2.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chien, HY., Huang, CW. A Lightweight Authentication Protocol for Low-Cost RFID. J Sign Process Syst Sign Image Video Technol 59, 95–102 (2010). https://doi.org/10.1007/s11265-008-0281-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11265-008-0281-8