Skip to main content
Top

2015 | OriginalPaper | Chapter

A Lightweight Code-Based Authentication Protocol for RFID Systems

Authors : Zhuohua Liu, Wei Zhang, Chuankun Wu

Published in: Applications and Techniques in Information Security

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

RFID is consider to be a common and useful tool in many applications, such as supply chain management, logistics, manufacturing, inventory control and so on. With the widespread adoption of RFID, the security and privacy issues of RFID systems are drawing more and more attention. In this paper, we propose a lightweight mutual authentication protocol based on error correction code for RFID systems with constant authentication time. Further analysis of the protocol shows that it also satisfies the essential requirements of RFID systems, including tag anonymity, location privacy, forward security, resistance to replay attack and de-synchronization attack, and immunity to tag compromise attack. We also compare our protocol with previous works in terms of security and performance.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Chien, H.Y.: Sasi: a new ultralightweight rfid authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Secure Comput. 4(4), 337–340 (2007)MathSciNetCrossRef Chien, H.Y.: Sasi: a new ultralightweight rfid authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Secure Comput. 4(4), 337–340 (2007)MathSciNetCrossRef
2.
go back to reference Chen, Y., Chou, J.S., Sun, H.M.: A novel mutual authentication scheme based on quadratic residues for rfid systems. Comput. Netw. 52(12), 2373–2380 (2008)MATHCrossRef Chen, Y., Chou, J.S., Sun, H.M.: A novel mutual authentication scheme based on quadratic residues for rfid systems. Comput. Netw. 52(12), 2373–2380 (2008)MATHCrossRef
3.
go back to reference Lee, Y.K. , Batina, L., Verbauwhede, I.: Ec-rac (ecdlp based randomized access control): provably secure rfid authentication protocol. In: 2008 IEEE International Conference on RFID, pp. 97–104. IEEE (2008) Lee, Y.K. , Batina, L., Verbauwhede, I.: Ec-rac (ecdlp based randomized access control): provably secure rfid authentication protocol. In: 2008 IEEE International Conference on RFID, pp. 97–104. IEEE (2008)
4.
go back to reference Zhang, X., Li, L., Wu, Y., Zhang, Q.: An ecdlp-based randomized key rfid authentication protocol. In: 2011 International Conference on Network Computing and Information Security (NCIS), vol. 2, pp. 146–149. IEEE (2011) Zhang, X., Li, L., Wu, Y., Zhang, Q.: An ecdlp-based randomized key rfid authentication protocol. In: 2011 International Conference on Network Computing and Information Security (NCIS), vol. 2, pp. 146–149. IEEE (2011)
5.
go back to reference Chien, H.Y.: Combining rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices. Comput. Netw. 57(14), 2705–2717 (2013)MathSciNetCrossRef Chien, H.Y.: Combining rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices. Comput. Netw. 57(14), 2705–2717 (2013)MathSciNetCrossRef
6.
go back to reference Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-chain based forward-secure privacy protection scheme for low-cost rfid. Proc. SCIS 2004, 719–724 (2004) Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-chain based forward-secure privacy protection scheme for low-cost rfid. Proc. SCIS 2004, 719–724 (2004)
7.
go back to reference Lu, L., Han, J., Hu, L., Liu, Y., Ni, L.M.: Dynamic key-updating: privacy-preserving authentication for rfid systems. In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2007, pp. 13–22. IEEE (2007) Lu, L., Han, J., Hu, L., Liu, Y., Ni, L.M.: Dynamic key-updating: privacy-preserving authentication for rfid systems. In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2007, pp. 13–22. IEEE (2007)
8.
go back to reference Lu, L., Han, J., Xiao, R., Liu, Y.: Action: breaking the privacy barrier for rfid systems. In: IEEE INFOCOM 2009, pp. 1953–1961. IEEE (2009) Lu, L., Han, J., Xiao, R., Liu, Y.: Action: breaking the privacy barrier for rfid systems. In: IEEE INFOCOM 2009, pp. 1953–1961. IEEE (2009)
9.
go back to reference Alomair, B., Clark, A., Cuellar, J., Poovendran, R.: Scalable rfid systems: a privacy-preserving protocol with constant-time identification. IEEE Trans. Parallel Distrib. Syst. 23(8), 1536–1550 (2012)CrossRef Alomair, B., Clark, A., Cuellar, J., Poovendran, R.: Scalable rfid systems: a privacy-preserving protocol with constant-time identification. IEEE Trans. Parallel Distrib. Syst. 23(8), 1536–1550 (2012)CrossRef
10.
go back to reference Chien, H.Y., Laih, C.S.: Ecc-based lightweight authentication protocol with untraceability for low-cost rfid. J. Parallel Distrib. Comput. 69(10), 848–853 (2009)CrossRef Chien, H.Y., Laih, C.S.: Ecc-based lightweight authentication protocol with untraceability for low-cost rfid. J. Parallel Distrib. Comput. 69(10), 848–853 (2009)CrossRef
11.
go back to reference Liu, A.X., Bailey, L.A., Krishnamurthy, A.H.: Rfidguard: a lightweight privacy and authentication protocol for passive rfid tags. Secur. Commun. Netw. 3(5), 384–393 (2010)CrossRef Liu, A.X., Bailey, L.A., Krishnamurthy, A.H.: Rfidguard: a lightweight privacy and authentication protocol for passive rfid tags. Secur. Commun. Netw. 3(5), 384–393 (2010)CrossRef
12.
go back to reference Chen, C.M., Chen, S.M., Zheng, X., Chen, P.Y., Sun, H.M.: A secure rfid authentication protocol adopting error correction code. Sci. World J. 2014, 12 (2014) Chen, C.M., Chen, S.M., Zheng, X., Chen, P.Y., Sun, H.M.: A secure rfid authentication protocol adopting error correction code. Sci. World J. 2014, 12 (2014)
13.
go back to reference Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293–308. Springer, Heidelberg (2005) CrossRef Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293–308. Springer, Heidelberg (2005) CrossRef
14.
go back to reference Li, T., Deng, R.H., Wang, G.: The security and improvement of an ultra-lightweight rfid authentication protocol. Secur. Commun. Netw. 1(2), 135–146 (2008)CrossRef Li, T., Deng, R.H., Wang, G.: The security and improvement of an ultra-lightweight rfid authentication protocol. Secur. Commun. Netw. 1(2), 135–146 (2008)CrossRef
15.
go back to reference Sarma, S.E., Weis, S.A., Engels, D.: Radio-frequency-identification security risks and challenges. Cryptobytes 6(1), 2–9 (2003) Sarma, S.E., Weis, S.A., Engels, D.: Radio-frequency-identification security risks and challenges. Cryptobytes 6(1), 2–9 (2003)
16.
go back to reference Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004) CrossRef Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004) CrossRef
17.
go back to reference Molnar, D., Wagner, D.: Privacy and security in library rfid: issues, practices, and architectures. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 210–219. ACM (2004) Molnar, D., Wagner, D.: Privacy and security in library rfid: issues, practices, and architectures. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 210–219. ACM (2004)
18.
go back to reference Dimitriou, T.: A secure and efficient rfid protocol that could make big brother (partially) obsolete. In: Fourth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006, pp. 269–275. IEEE (2006) Dimitriou, T.: A secure and efficient rfid protocol that could make big brother (partially) obsolete. In: Fourth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006, pp. 269–275. IEEE (2006)
19.
go back to reference Yao, Q., Qi, Y., Han, J., Zhao, J., Li, X., Liu, Y.: Randomizing rfid private authentication. In: IEEE International Conference on Pervasive Computing and Communications, PerCom 2009, pp. 1–10. IEEE (2009) Yao, Q., Qi, Y., Han, J., Zhao, J., Li, X., Liu, Y.: Randomizing rfid private authentication. In: IEEE International Conference on Pervasive Computing and Communications, PerCom 2009, pp. 1–10. IEEE (2009)
20.
go back to reference Li, T., Luo, W., Mo, Z., Chen, S.: Privacy-preserving rfid authentication based on cryptographical encoding. In: INFOCOM, 2012 Proceedings IEEE, pp. 2174–2182. IEEE (2012) Li, T., Luo, W., Mo, Z., Chen, S.: Privacy-preserving rfid authentication based on cryptographical encoding. In: INFOCOM, 2012 Proceedings IEEE, pp. 2174–2182. IEEE (2012)
21.
go back to reference Liao, Y.P., Hsiao, C.M.: A secure ecc-based rfid authentication scheme integrated with id-verifier transfer protocol. Ad Hoc Networks (2013) Liao, Y.P., Hsiao, C.M.: A secure ecc-based rfid authentication scheme integrated with id-verifier transfer protocol. Ad Hoc Networks (2013)
22.
go back to reference Berlekamp, E.R., McEliece, R.J., Henk, C.A., Van, T.: On the inherent intractability of certain coding problems. IEEE Trans. Inf. Theor. 24(3), 384–386 (1978)MATHCrossRef Berlekamp, E.R., McEliece, R.J., Henk, C.A., Van, T.: On the inherent intractability of certain coding problems. IEEE Trans. Inf. Theor. 24(3), 384–386 (1978)MATHCrossRef
23.
go back to reference McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. DSN Prog. Rep. 42(44), 114–116 (1978) McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. DSN Prog. Rep. 42(44), 114–116 (1978)
24.
go back to reference Gaborit, P., Girault, M.: Lightweight code-based identification and signature. In: IEEE International Symposium on Information Theory, ISIT 2007, pp. 191–195. IEEE (2007) Gaborit, P., Girault, M.: Lightweight code-based identification and signature. In: IEEE International Symposium on Information Theory, ISIT 2007, pp. 191–195. IEEE (2007)
25.
go back to reference Misoczki, R., Tillich, J.P., Sendrier, N., Barreto, P.S.: Mdpc-mceliece: new mceliece variants from moderate density parity-check codes. In: 2013 IEEE International Symposium on Information Theory Proceedings (ISIT), pp. 2069–2073. IEEE (2013) Misoczki, R., Tillich, J.P., Sendrier, N., Barreto, P.S.: Mdpc-mceliece: new mceliece variants from moderate density parity-check codes. In: 2013 IEEE International Symposium on Information Theory Proceedings (ISIT), pp. 2069–2073. IEEE (2013)
26.
go back to reference von Maurich, I., Güneysu, T.: Lightweight code-based cryptography: qc-mdpc mceliece encryption on reconfigurable devices. In: Proceedings of the conference on Design, Automation & Test in Europe, p. 38. European Design and Automation Association (2014) von Maurich, I., Güneysu, T.: Lightweight code-based cryptography: qc-mdpc mceliece encryption on reconfigurable devices. In: Proceedings of the conference on Design, Automation & Test in Europe, p. 38. European Design and Automation Association (2014)
27.
go back to reference Sun, H.M., Ting, W.C., Wang, K.H.: On the security of chien’s ultralightweight rfid authentication protocol. IEEE Trans. Dependable Secure Comput. 2, 315–317 (2009) Sun, H.M., Ting, W.C., Wang, K.H.: On the security of chien’s ultralightweight rfid authentication protocol. IEEE Trans. Dependable Secure Comput. 2, 315–317 (2009)
28.
go back to reference Phan, R.W.: Cryptanalysis of a new ultralightweight rfid authentication protocolsasi. IEEE Trans. Dependable Secure Comput. 6(4), 316–320 (2009)CrossRef Phan, R.W.: Cryptanalysis of a new ultralightweight rfid authentication protocolsasi. IEEE Trans. Dependable Secure Comput. 6(4), 316–320 (2009)CrossRef
29.
go back to reference Chen, C.M., Chen, S.M., Zheng, X.Y., Yan, L., Wang, H., Sun, H.M.: Pitfalls in an ecc-based lightweight authentication protocol for low-cost rfid. J. Inf. Hiding Multimed. Signal Process. 5(4) (2014) Chen, C.M., Chen, S.M., Zheng, X.Y., Yan, L., Wang, H., Sun, H.M.: Pitfalls in an ecc-based lightweight authentication protocol for low-cost rfid. J. Inf. Hiding Multimed. Signal Process. 5(4) (2014)
30.
go back to reference Gilbert, H., Robshaw, M., Sibert, H.: Active attack against hb+: a provably secure lightweight authentication protocol. Electronic. Lett. 41(21), 1169–1170 (2005)CrossRef Gilbert, H., Robshaw, M., Sibert, H.: Active attack against hb+: a provably secure lightweight authentication protocol. Electronic. Lett. 41(21), 1169–1170 (2005)CrossRef
31.
go back to reference Erguler, I.: A key recovery attack on error correcting code based a lightweight security protocol Erguler, I.: A key recovery attack on error correcting code based a lightweight security protocol
Metadata
Title
A Lightweight Code-Based Authentication Protocol for RFID Systems
Authors
Zhuohua Liu
Wei Zhang
Chuankun Wu
Copyright Year
2015
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-48683-2_11

Premium Partner