Skip to main content
Top
Published in:
Cover of the book

2016 | OriginalPaper | Chapter

A Lightweight RFID Authentication Protocol with Forward Security and Randomized Identifier

Authors : Zhicai Shi, Fei Wu, Changzhi Wang, Shitao Ren

Published in: Security, Privacy, and Anonymity in Computation, Communication, and Storage

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The RFID tags only have limited computing and memory resources. This makes it difficult to solve their security and privacy problems. Authentication is considered as an effective approach to protect the security and privacy of RFID systems. Based on Hash function and the randomization of the tag’s identifier, a lightweight authentication protocol is proposed. The protocol uses Hash function to ensure the anonymity and confidentiality of the RFID system. It uses a randomization function to randomize the tag’s identifier to enhance the difficulty to reveal the secrecy of the RFID system. Time stamp and pseudorandom number generator are combined to prevent replay attack. It also completes the strong authentication of the backend server to the tag by twice authentication. The analysis shows that this protocol provides forward security and it can prevent eavesdropping, tracing, replay and de-synchronize attack. The protocol only uses Hash function and pseudorandom number generator. It is very suitable to the low-cost RFID system.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Chen, M., Luo, W., Mo, Z., Chen, S., Fang, Y.: An efficient tag search protocol in large-scale RFID systems with noisy channel. IEEE/ACM Trans. Netw. 24(2), 703–716 (2016) Chen, M., Luo, W., Mo, Z., Chen, S., Fang, Y.: An efficient tag search protocol in large-scale RFID systems with noisy channel. IEEE/ACM Trans. Netw. 24(2), 703–716 (2016)
2.
go back to reference Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: RFID systems: a survey on security threats and proposed solutions. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 159–170. Springer, Heidelberg (2006). doi:10.1007/11872153_14 CrossRef Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: RFID systems: a survey on security threats and proposed solutions. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 159–170. Springer, Heidelberg (2006). doi:10.​1007/​11872153_​14 CrossRef
3.
go back to reference Chikouche, N., Cherif, F., Cayrel, P.-L.: Weaknesses in two RFID authentication weaknesses. In: El Hajji, S., et al. (eds.) C2SI 2015, LNCS, vol. 9084, pp. 162–172. Springer, Heidelberg (2015) Chikouche, N., Cherif, F., Cayrel, P.-L.: Weaknesses in two RFID authentication weaknesses. In: El Hajji, S., et al. (eds.) C2SI 2015, LNCS, vol. 9084, pp. 162–172. Springer, Heidelberg (2015)
4.
go back to reference Deng, R.H., Li, Y., Yung, M., Zhao, Y.: A new framework for RFID privacy. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 1–18. Springer, Heidelberg (2010). doi:10.1007/978-3-642-15497-3_1 CrossRef Deng, R.H., Li, Y., Yung, M., Zhao, Y.: A new framework for RFID privacy. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 1–18. Springer, Heidelberg (2010). doi:10.​1007/​978-3-642-15497-3_​1 CrossRef
5.
go back to reference Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Proceedings of the 1st International Conference on Security in Pervasive Computing, Boppard, Germany, pp. 201–212 (2003) Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Proceedings of the 1st International Conference on Security in Pervasive Computing, Boppard, Germany, pp. 201–212 (2003)
6.
go back to reference Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to “Privacy-Friendly” tags. In: RFID Privacy Workshop. MIT Press, Cambridge (2003) Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to “Privacy-Friendly” tags. In: RFID Privacy Workshop. MIT Press, Cambridge (2003)
7.
go back to reference Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-chain based forward secure privacy protection scheme for low-cost RFID. In: Proceedings of the 2004 Symposium on Cryptography and Information Security, Sendai, Japan, pp. 719–724 (2004) Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-chain based forward secure privacy protection scheme for low-cost RFID. In: Proceedings of the 2004 Symposium on Cryptography and Information Security, Sendai, Japan, pp. 719–724 (2004)
8.
go back to reference Yeo, S.-S., Kim, S.K.: Scalable and flexible privacy protection scheme for RFID systems. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 153–163. Springer, Heidelberg (2005). doi:10.1007/11601494_13 CrossRef Yeo, S.-S., Kim, S.K.: Scalable and flexible privacy protection scheme for RFID systems. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 153–163. Springer, Heidelberg (2005). doi:10.​1007/​11601494_​13 CrossRef
9.
go back to reference Lee, Y.K., Verbauwhede, I.: Secure and low-cost RFID authentication protocols. In: Proceedings of the 2nd IEEE Workshop on Adaptive Wireless Networks, St. Louis, USA, pp. 1–5 (2005) Lee, Y.K., Verbauwhede, I.: Secure and low-cost RFID authentication protocols. In: Proceedings of the 2nd IEEE Workshop on Adaptive Wireless Networks, St. Louis, USA, pp. 1–5 (2005)
10.
go back to reference Lee, S.M., Hwang, Y.J., Lee, D.H., Lim, J.I.: Efficient authentication for low-cost RFID systems. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganà, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3480, pp. 619–627. Springer, Heidelberg (2005). doi:10.1007/11424758_65 CrossRef Lee, S.M., Hwang, Y.J., Lee, D.H., Lim, J.I.: Efficient authentication for low-cost RFID systems. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganà, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3480, pp. 619–627. Springer, Heidelberg (2005). doi:10.​1007/​11424758_​65 CrossRef
11.
go back to reference Cho, J.-S., Yeo, S.S., Kim, S.K.: Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value. Comput. Commun. 34(3), 391–397 (2011) Cho, J.-S., Yeo, S.S., Kim, S.K.: Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value. Comput. Commun. 34(3), 391–397 (2011)
12.
go back to reference Cho, J.-S., Jeong, Y.-S., Sang, O.-P.: Consideration on the brute-force attack cost and retrieval cost: a hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Comput. Math. Appl. 3, 1–8 (2012) Cho, J.-S., Jeong, Y.-S., Sang, O.-P.: Consideration on the brute-force attack cost and retrieval cost: a hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Comput. Math. Appl. 3, 1–8 (2012)
13.
go back to reference Kim, H.: Desynchronization attack on hash-based RFID mutual authentication protocol. J. Secur. Eng. 9(4), 357–365 (2012) Kim, H.: Desynchronization attack on hash-based RFID mutual authentication protocol. J. Secur. Eng. 9(4), 357–365 (2012)
14.
go back to reference Khedr, W.I.: SRFID: a hash-based secure scheme for low cost RFID systems. Egypt. Inf. J. 14, 89–98 (2013) Khedr, W.I.: SRFID: a hash-based secure scheme for low cost RFID systems. Egypt. Inf. J. 14, 89–98 (2013)
15.
go back to reference Safkhani, M., Peris-Lopez, P., Hernandez-Castro, J.C., Bagheri, N.: Cryptanalysis of the Cho et al. protocol: a hash-based RFID tag mutual authentication protocol. J. Comput. Appl. Math. 259, 571–577 (2014) Safkhani, M., Peris-Lopez, P., Hernandez-Castro, J.C., Bagheri, N.: Cryptanalysis of the Cho et al. protocol: a hash-based RFID tag mutual authentication protocol. J. Comput. Appl. Math. 259, 571–577 (2014)
16.
17.
go back to reference Sun, D.-Z., Zhong, J.-D.: A hash-based RFID security protocol for strong privacy protection. IEEE Trans. Consum. Electron. 58(4), 1246–1252 (2012) Sun, D.-Z., Zhong, J.-D.: A hash-based RFID security protocol for strong privacy protection. IEEE Trans. Consum. Electron. 58(4), 1246–1252 (2012)
18.
go back to reference Yang, L., Yu, P., Bailing, W., Yun, Q., Xuefeng, B.: Hash-based RFID mutual authentication protocol. Int. J. Secur. Appl. 7(3), 183–194 (2013) Yang, L., Yu, P., Bailing, W., Yun, Q., Xuefeng, B.: Hash-based RFID mutual authentication protocol. Int. J. Secur. Appl. 7(3), 183–194 (2013)
19.
go back to reference Bogdanov, A., Knežević, M., Leander, G., Toz, D., Varıcı, K., Verbauwhede, I.: Spongent: a lightweight hash function. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 312–325. Springer, Heidelberg (2011). doi:10.1007/978-3-642-23951-9_21 CrossRef Bogdanov, A., Knežević, M., Leander, G., Toz, D., Varıcı, K., Verbauwhede, I.: Spongent: a lightweight hash function. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 312–325. Springer, Heidelberg (2011). doi:10.​1007/​978-3-642-23951-9_​21 CrossRef
20.
go back to reference Gao, S., Wang, H.: Forward private RFID authentication protocol based on universal hash function. J. Inf. Comput. Sci. 10(11), 3477–3488 (2013) Gao, S., Wang, H.: Forward private RFID authentication protocol based on universal hash function. J. Inf. Comput. Sci. 10(11), 3477–3488 (2013)
Metadata
Title
A Lightweight RFID Authentication Protocol with Forward Security and Randomized Identifier
Authors
Zhicai Shi
Fei Wu
Changzhi Wang
Shitao Ren
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-49148-6_1

Premium Partner