Skip to main content
Log in

A Lightweight Authentication Protocol for Low-Cost RFID

  • Published:
Journal of Signal Processing Systems Aims and scope Submit manuscript

Abstract

As low-cost RFIDs with limited resources will dominate most of the RFID market, it is imperative to design lightweight RFID authentication protocols for these low-cost RFIDs. However, most of existing RFID authentication protocols either suffer from some security weaknesses or require costly operations that are not available on low-cost tags. In this paper, we analyze the security vulnerabilities of a lightweight authentication protocol recently proposed by Li et al. (2006), and then propose a new lightweight protocol to improve the security and to reduce the computational cost for identifying a tag from O(n) to O(1).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2

Similar content being viewed by others

References

  1. Henrici, D., & Müller, P. (2004). Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. PerSec04 at IEEE PerCom.

  2. Lee, S. M., Hwang, Y. J., Lee, D. H., & Lim, J. I. (2005). Efficient authentication for low-cost RFID systems. International Conference on Computational Science and its Applications–ICCSA 2005.

  3. Weis, S. A., Sarma, S. E., Rivest, R. L., & Engels, D. W. (2003). Security and privacy aspects of low-cost radio frequency identification systems. International Conference on Security in Pervasive Computing.

  4. Li, Y. Z., Cho, Y. B., Um, N. K., & Lee, S. H. (2006). Security and privacy on authentication protocol for low-cost RFID. IEEE International Conference on Computational Intelligence and Security, volume 2, pp. 1101–1104.

  5. Lee, Y. K., & Verbauwhede, I. (2005). Secure and low-cost RFID authentication protocols. 2nd IEEE International Workshop on Adaptive Wireless Networks (AWiN), November 2005.

  6. Chien, H. Y., & Chen, C. H. (2007). Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standards & Interfaces, 29(2), 254–259. doi:10.1016/j.csi.2006.04.004.

    Article  MathSciNet  Google Scholar 

  7. Lin, C.-L., & Chang, G.-G. (2007). Cryptanalysis of EPC class 1 generation 2 RFID authentication. Information Security Conference 2007, ChiaYi, Taiwan.

  8. Duc, D. N., Park, J., Lee, H., & Kim, K. (2006). Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning. The 2006 Symposium on Cryptography and Information Security.

  9. Karthikeyan, S., & Nesterenko, M. (2005). RFID security without extensive cryptography. In Workshop on security of ad hoc and sensor networks (pp. 63–67). Alexandria, Virginia, USA: ACM.

  10. Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2008). LAMED—A PRNG for EPC Class-1 Generation-2 RFID specification. Computers Standards and Interfaces. doi:10.1016/j.csi.2007.11.013.

  11. EPCglobal Inc: UHF Class 1 Gen 2 Standard Version 1.1.0, 2007, http://www.epcglobalinc.org/standards/uhfc1g2/ (2007/10/20).

  12. ISO/IEC FCD 15693-3. Identification cards–contactless integrated circuit cards–vicinity cards—Part 3: Anticollision and transmission protocol.

  13. Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2006). LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. Proceedings of the 2nd Workshop on RFID Security, July 2006.

  14. Chien, H. Y., & Huang, C. W. (2007). Security of ultra-lightweight RFID authentication protocols and its improvements. ACM Operating System Reviews, 41(Issue 4), 83–86.

    Article  Google Scholar 

  15. Chien, H. Y. (2007). SASI: A new ultra-lightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(4), 337–340. doi:10.1109/TDSC.2007.70226.

    Article  Google Scholar 

  16. D’Arco1, P., & Santis, A. D. (2008). Weaknesses in a recent ultra-lightweight RFID authentication protocol. AFRICACRYPT 2008, LNCS 5023, pp. 27–39. Berlin: Springer.

Download references

Acknowledgments

We sincerely appreciate the anonymous reviewers for providing us the valuable comments. This research is partially supported by National Science Council with project number NSC95-2221-E-260-050-MY2.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hung-Yu Chien.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chien, HY., Huang, CW. A Lightweight Authentication Protocol for Low-Cost RFID. J Sign Process Syst Sign Image Video Technol 59, 95–102 (2010). https://doi.org/10.1007/s11265-008-0281-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11265-008-0281-8

Keywords

Navigation