Abstract
Radio frequency identification (RFID) is a fast growing technology for automatically identification in various industries. However, RFID system arises many security and privacy problems. Due to resource constraints in RFID tags, ultralightweight authentication schemes are an effective way to avoid these problems. In this paper, we present an ultralightweight authentication scheme which integrates cyclic redundancy check and syndrome decoding mechanism to enhance the security and privacy functionality without increasing any computation cost. In the proposed scheme, the server needs to store a generator matrix and corresponding parity-check matrix of a linear code for tag matching and authentication. Also, tags need to store only a codeword of the linear code as a unique identification number and a secret key. Our security analysis shows that the scheme provides higher security to prevent existing possible attacks. Performance evaluation illustrates that the scheme uses very less resources on tags in terms of computational operations and memory storage.
Similar content being viewed by others
References
Ahmadian, Z., Salmasizadeh, M., & Aref, M. R. (2013). Desynchronization attack on RAPP ultralightweight authentication protocol. Information Processing Letters, 113(7), 205–209.
Alomair, B., Lazos, L., & Poovendran, R. (2007). Passive attacks on a class of authentication protocols for RFID. Berlin: Springer.
Basu, M., Rahaman, M., & Bagchi, S. (2009). On a new code, \([2^n-1, n, 2^{n-1}]\). Discrete Applied Mathematics, 157(2), 402–405.
Chien, H. Y. (2007). SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(4), 337–340.
Gao, L., Ma, M., Shu, Y., & Wei, Y. (2013). A security protocol resistant to intermittent position trace attacks and desynchronization attacks in RFID systems. Wireless Personal Communications, 68(4), 1943–1959.
Henrici, D., & Muller, P. (2004). Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In Proceedings of the second IEEE annual conference on pervasive computing and communications workshops, 2004 (pp. 149–153).
Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 24(2), 381–394.
Khan, G., & Moessner, M. (2015). Low-cost authentication protocol for passive, computation capable RFID tags. Wireless Networks, 21(2), 565–580.
Li, T., & Wang, G. (2007). Security analysis of two ultra-lightweight RFID authentication protocols. Berlin: Springer.
Ling, S., & Xing, C. (2004). Coding theory. Cambridge: Cambridge University Press.
Peris-Lopez, P., Hernandez-Castro, J., Estevez-Tapiador, J., & Ribagorda, A. (2006). \(\text{M}^{{\rm 2}}\text{ AP }\): A minimalist mutual-authentication protocol for low-cost RFID tags. In Ubiquitous intelligence and computing: Third international conference, UIC 2006, Wuhan, China, September 3–6, 2006. Proceedings (Vol. 4159, pp. 912–923).
Sun, H. M., & Ting, W. C. (2009). A gen2-based RFID authentication protocol for security and privacy. IEEE Transactions on Mobile Computing, 8(8), 1052–1062.
Tian, Y., Chen, G., & Li, J. (2012). A new ultralightweight RFID authentication protocol with permutation. IEEE Communications Letters, 16(5), 702–705.
Weis, S., Sarma, S., Rivest, R., & Engels, D. (2004). Security and privacy aspects of low-cost radio frequency identification systems. Security in Pervasive Computing, 2802, 201–212.
Acknowledgements
The authors would like to thank the anonymous reviewers for their valuable comments and suggestions to improve the quality of the paper.
Conflict of interest
The authors P. K. Maurya thanks the Institute NIT Durgapur and J. Pal thanks to DST-INSPIRE, India, for financial support of their research works.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Maurya, P.K., Pal, J. & Bagchi, S. A Coding Theory Based Ultralightweight RFID Authentication Protocol with CRC. Wireless Pers Commun 97, 967–976 (2017). https://doi.org/10.1007/s11277-017-4546-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-4546-z