Skip to main content
Top

2014 | OriginalPaper | Chapter

A Lightweight Mutual Authentication Protocol for RFID

Authors : Changlun Zhang, Haibing Mu

Published in: Advanced Technologies, Embedded and Multimedia for Human-centric Computing

Publisher: Springer Netherlands

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In order to protect the tag and its communication, the authentication between the tag and the reader as well as its backend database is necessary. The paper proposed a mutual authentication protocol by introducing pointer and check number pool which make a simple random number to hide the ID information and disturb the static answers in challenge-response of the protocol. The check number pair selected from the pool in each authentication turn is also pointed out by a random number which controls the shifting of the pointer in pool. The analysis shows that the protocol can resist the common attacks in RFID communication with low computation overhead.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Sarma SE, Wreis SA, Engels DW (2003) Radio frequency identification: Secure risks and challenges. RSA Laboratories Cryptobytes 6(1):2–9 Sarma SE, Wreis SA, Engels DW (2003) Radio frequency identification: Secure risks and challenges. RSA Laboratories Cryptobytes 6(1):2–9
2.
go back to reference Sarma SE, Wreis SA, Engels DW (2003) RFID systems and security and privacy implications. In: Proceedings of the 4th intemational workshop on cryptographic hardware and embedded systems, pp 454–469 Sarma SE, Wreis SA, Engels DW (2003) RFID systems and security and privacy implications. In: Proceedings of the 4th intemational workshop on cryptographic hardware and embedded systems, pp 454–469
3.
go back to reference Juels A, Rivest RL, Szydlo M (2003) The blocker tag: selective blocking of RFID tags for consumer privacy. In: Proceedings of the 10th ACM conference on computer and communications security, Washington DC, USA, pp 103–111 Juels A, Rivest RL, Szydlo M (2003) The blocker tag: selective blocking of RFID tags for consumer privacy. In: Proceedings of the 10th ACM conference on computer and communications security, Washington DC, USA, pp 103–111
4.
go back to reference Ohkubo M, Suzuki K, Kinoshita S (2004) Hash-chain based forward-secure privacy protection scheme for low-cost RFID. In: Proceedings of the 2004 symposium on cryptography and information security (scis 2004), Sendai, pp 719–724 Ohkubo M, Suzuki K, Kinoshita S (2004) Hash-chain based forward-secure privacy protection scheme for low-cost RFID. In: Proceedings of the 2004 symposium on cryptography and information security (scis 2004), Sendai, pp 719–724
5.
go back to reference Rhee K, Kwak J, Kim S (2005) Challenge-response based RFID authentication protocol for distributed database environment. In: Proceedings of the 2nd international conference on security in pervasive computing (SPC 2005). Lectures Notes in Computer Science 3450. Springer, Berlin, pp 70–84 Rhee K, Kwak J, Kim S (2005) Challenge-response based RFID authentication protocol for distributed database environment. In: Proceedings of the 2nd international conference on security in pervasive computing (SPC 2005). Lectures Notes in Computer Science 3450. Springer, Berlin, pp 70–84
6.
go back to reference Duc DN, Park J, Lee H, et a1 (2006) Enhancing security of EPC global gen 2 RFID tag against traceability and cloning. In: Symposium on cryptography and information security-SCIS 2006, Hiroshima, Japan Duc DN, Park J, Lee H, et a1 (2006) Enhancing security of EPC global gen 2 RFID tag against traceability and cloning. In: Symposium on cryptography and information security-SCIS 2006, Hiroshima, Japan
7.
go back to reference Chien H, Chen C (2007) Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Comput Stand Interfaces 29(2):254–259MathSciNetCrossRef Chien H, Chen C (2007) Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Comput Stand Interfaces 29(2):254–259MathSciNetCrossRef
8.
go back to reference Yuan S, Dai H, Lai S (2008) Hash based RFID authentication protocol. Comput Eng 12:51 Yuan S, Dai H, Lai S (2008) Hash based RFID authentication protocol. Comput Eng 12:51
9.
go back to reference Yang L, Chen Z (2010) A mutual authentication protocol for low-cost RFID Yang L, Chen Z (2010) A mutual authentication protocol for low-cost RFID
10.
go back to reference Juels A (2007) RFID security and privacy: a research survey. IEEE J Sel Areas in Commun 24:381 Juels A (2007) RFID security and privacy: a research survey. IEEE J Sel Areas in Commun 24:381
11.
go back to reference Tian Y, Chen G, Li J (2012) A new ultralightweight RFID authentication protocol with permutation. Commun Lett IEEE 16(5):702–705CrossRef Tian Y, Chen G, Li J (2012) A new ultralightweight RFID authentication protocol with permutation. Commun Lett IEEE 16(5):702–705CrossRef
12.
go back to reference Di Pietro R, Molva R. Information confinement, privacy, and security in RFID systems. In: Computer security–ESORICS 2007. Springer, Berlin, pp 187–202 Di Pietro R, Molva R. Information confinement, privacy, and security in RFID systems. In: Computer security–ESORICS 2007. Springer, Berlin, pp 187–202
13.
go back to reference Blass EO, Kurmus A, Molva R et al (2011) The F_f-family of protocols for RFID-privacy and authentication. IEEE Trans Dependable Secure Comput 8(3):466–480CrossRef Blass EO, Kurmus A, Molva R et al (2011) The F_f-family of protocols for RFID-privacy and authentication. IEEE Trans Dependable Secure Comput 8(3):466–480CrossRef
14.
go back to reference Liu AX, Bailey LRA (2009) PAP: a privacy and authentication protocol for passive RFID tags. Comput Commun 32(7):1194–1199CrossRef Liu AX, Bailey LRA (2009) PAP: a privacy and authentication protocol for passive RFID tags. Comput Commun 32(7):1194–1199CrossRef
15.
go back to reference Molnar D, Wagner D (2004) Privacy and security in library RFID: issues, practices, and architectures. In: Proceedings of the 11th ACM conference on computer and communications security, pp 210–219 Molnar D, Wagner D (2004) Privacy and security in library RFID: issues, practices, and architectures. In: Proceedings of the 11th ACM conference on computer and communications security, pp 210–219
16.
go back to reference Lee S, Asano T, Kim K (2006) RFID mutual authentication scheme based on synchronized secret information. In: Symposium on cryptography and information security Lee S, Asano T, Kim K (2006) RFID mutual authentication scheme based on synchronized secret information. In: Symposium on cryptography and information security
Metadata
Title
A Lightweight Mutual Authentication Protocol for RFID
Authors
Changlun Zhang
Haibing Mu
Copyright Year
2014
Publisher
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-7262-5_106