Skip to main content
Log in

A Coding Theory Based Ultralightweight RFID Authentication Protocol with CRC

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Radio frequency identification (RFID) is a fast growing technology for automatically identification in various industries. However, RFID system arises many security and privacy problems. Due to resource constraints in RFID tags, ultralightweight authentication schemes are an effective way to avoid these problems. In this paper, we present an ultralightweight authentication scheme which integrates cyclic redundancy check and syndrome decoding mechanism to enhance the security and privacy functionality without increasing any computation cost. In the proposed scheme, the server needs to store a generator matrix and corresponding parity-check matrix of a linear code for tag matching and authentication. Also, tags need to store only a codeword of the linear code as a unique identification number and a secret key. Our security analysis shows that the scheme provides higher security to prevent existing possible attacks. Performance evaluation illustrates that the scheme uses very less resources on tags in terms of computational operations and memory storage.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Ahmadian, Z., Salmasizadeh, M., & Aref, M. R. (2013). Desynchronization attack on RAPP ultralightweight authentication protocol. Information Processing Letters, 113(7), 205–209.

    Article  MATH  MathSciNet  Google Scholar 

  2. Alomair, B., Lazos, L., & Poovendran, R. (2007). Passive attacks on a class of authentication protocols for RFID. Berlin: Springer.

    Book  MATH  Google Scholar 

  3. Basu, M., Rahaman, M., & Bagchi, S. (2009). On a new code, \([2^n-1, n, 2^{n-1}]\). Discrete Applied Mathematics, 157(2), 402–405.

    Article  MATH  MathSciNet  Google Scholar 

  4. Chien, H. Y. (2007). SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(4), 337–340.

    Article  Google Scholar 

  5. Gao, L., Ma, M., Shu, Y., & Wei, Y. (2013). A security protocol resistant to intermittent position trace attacks and desynchronization attacks in RFID systems. Wireless Personal Communications, 68(4), 1943–1959.

    Article  Google Scholar 

  6. Henrici, D., & Muller, P. (2004). Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In Proceedings of the second IEEE annual conference on pervasive computing and communications workshops, 2004 (pp. 149–153).

  7. Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 24(2), 381–394.

    Article  MathSciNet  Google Scholar 

  8. Khan, G., & Moessner, M. (2015). Low-cost authentication protocol for passive, computation capable RFID tags. Wireless Networks, 21(2), 565–580.

    Article  Google Scholar 

  9. Li, T., & Wang, G. (2007). Security analysis of two ultra-lightweight RFID authentication protocols. Berlin: Springer.

    Book  Google Scholar 

  10. Ling, S., & Xing, C. (2004). Coding theory. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  11. Peris-Lopez, P., Hernandez-Castro, J., Estevez-Tapiador, J., & Ribagorda, A. (2006). \(\text{M}^{{\rm 2}}\text{ AP }\): A minimalist mutual-authentication protocol for low-cost RFID tags. In Ubiquitous intelligence and computing: Third international conference, UIC 2006, Wuhan, China, September 3–6, 2006. Proceedings (Vol. 4159, pp. 912–923).

  12. Sun, H. M., & Ting, W. C. (2009). A gen2-based RFID authentication protocol for security and privacy. IEEE Transactions on Mobile Computing, 8(8), 1052–1062.

    Article  Google Scholar 

  13. Tian, Y., Chen, G., & Li, J. (2012). A new ultralightweight RFID authentication protocol with permutation. IEEE Communications Letters, 16(5), 702–705.

    Article  Google Scholar 

  14. Weis, S., Sarma, S., Rivest, R., & Engels, D. (2004). Security and privacy aspects of low-cost radio frequency identification systems. Security in Pervasive Computing, 2802, 201–212.

    Google Scholar 

Download references

Acknowledgements

The authors would like to thank the anonymous reviewers for their valuable comments and suggestions to improve the quality of the paper.

Conflict of interest

The authors P. K. Maurya thanks the Institute NIT Durgapur and J. Pal thanks to DST-INSPIRE, India, for financial support of their research works.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Satya Bagchi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Maurya, P.K., Pal, J. & Bagchi, S. A Coding Theory Based Ultralightweight RFID Authentication Protocol with CRC. Wireless Pers Commun 97, 967–976 (2017). https://doi.org/10.1007/s11277-017-4546-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4546-z

Keywords

Navigation