Skip to main content
Erschienen in: The Journal of Supercomputing 8/2019

21.07.2016

Lightweight mutual authentication RFID protocol for secure multi-tag simultaneous authentication in ubiquitous environments

verfasst von: Jungho Kang

Erschienen in: The Journal of Supercomputing | Ausgabe 8/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

RFID is a core technology enabling a ubiquitous environment. Its various applications have shown great progress in our daily life in fields such as distribution management, non-contacting authentication, payment cards, and hi-pass (highway toll payment) cards among others. However, the low security of RF (radio frequency) in the authentication stage makes most RFID tags on the market susceptible to privacy breaches and malicious attacks. This paper presents a lightweight bilateral RFID protocol design which reinforces the security vulnerabilities of conventional RFID systems. This design lightens the encryption process, enabling the adoption of protocols in the UHF bands proposed by the EPC Class-1 Generation-2 standards. It also utilizes the core characteristics of EPC tags, facilitating tag-to-tag bilateral authentication. Additionally, multi-tag authentication is applied for the inventory management and distribution environments that use UHF band RFID systems. The proposed protocol provides robust security regarding the known flaws of RF communication and has taken hardware into consideration allowing practical utilization such as management of food, medicine and medical supplies, and manufacturing components.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Finkenzeller K (2003) RFID handbook: fundamentals and applications in contactless smart cards and identification, 2nd edn. Wiley, New YorkCrossRef Finkenzeller K (2003) RFID handbook: fundamentals and applications in contactless smart cards and identification, 2nd edn. Wiley, New YorkCrossRef
2.
Zurück zum Zitat Yan L, Zhang Y, Yang LT, Ning H (2007) The internet of things from RFID to the next-generation pervasive networked systems. Auerbach Publications, Boca Raton Yan L, Zhang Y, Yang LT, Ning H (2007) The internet of things from RFID to the next-generation pervasive networked systems. Auerbach Publications, Boca Raton
3.
Zurück zum Zitat Chien H-Y, Chen C-H (2007) Mutual authentication protocol for RFID conforming to EPC class-1 generation-2 standards. Comput Stand Interfaces 29(2):254–259 (Elsevier Science Publishers) Chien H-Y, Chen C-H (2007) Mutual authentication protocol for RFID conforming to EPC class-1 generation-2 standards. Comput Stand Interfaces 29(2):254–259 (Elsevier Science Publishers)
4.
Zurück zum Zitat Piramuthu S (2007) Protocols for RFID tag/reader authentication. Decis Support Syst 43(3):897–914CrossRef Piramuthu S (2007) Protocols for RFID tag/reader authentication. Decis Support Syst 43(3):897–914CrossRef
5.
Zurück zum Zitat Kim C, Avoine G (2011) RFID distance bounding protocols with mixed challenges. IEEE Trans Wirel Commun 10(5):1618–1626CrossRef Kim C, Avoine G (2011) RFID distance bounding protocols with mixed challenges. IEEE Trans Wirel Commun 10(5):1618–1626CrossRef
6.
Zurück zum Zitat Kim C, Avoine G, Koeune F, Standaert F-X, Pereira O (2009) The Swiss-knife RFID distance bounding protocol. In: Information security and cryptology–ICISC 2008, Lecture Notes in Computer Science, vol 5461, pp 98–115 Kim C, Avoine G, Koeune F, Standaert F-X, Pereira O (2009) The Swiss-knife RFID distance bounding protocol. In: Information security and cryptology–ICISC 2008, Lecture Notes in Computer Science, vol 5461, pp 98–115
7.
Zurück zum Zitat Habibi MH, Gardeshi M, Alaghband MR (2011) Practical attacks on a RFID authentication protocol conforming to EPC C-1 G-2 standard. Int J UbiComp (IJU) 2(1):1–13CrossRef Habibi MH, Gardeshi M, Alaghband MR (2011) Practical attacks on a RFID authentication protocol conforming to EPC C-1 G-2 standard. Int J UbiComp (IJU) 2(1):1–13CrossRef
8.
Zurück zum Zitat Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2009) An ultra light authentication protocol resistant to passive attacks under the Gen-2 specification. J Inf Sci Eng 25(1):33–57 Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2009) An ultra light authentication protocol resistant to passive attacks under the Gen-2 specification. J Inf Sci Eng 25(1):33–57
9.
Zurück zum Zitat Peris-Lopez P, Hernandez-Castro JC, Estervez-Tapiador JM, Ribagorda A (2009) Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Comput Stand Interfaces 31(2):372–380CrossRef Peris-Lopez P, Hernandez-Castro JC, Estervez-Tapiador JM, Ribagorda A (2009) Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Comput Stand Interfaces 31(2):372–380CrossRef
10.
Zurück zum Zitat Jules A (2004) Yoking proofs for RFID tags. In: IEEE Computer Society, Proceedings of the first international workshop on pervasive computing and communication security-PerSec 2004, pp 138–143 Jules A (2004) Yoking proofs for RFID tags. In: IEEE Computer Society, Proceedings of the first international workshop on pervasive computing and communication security-PerSec 2004, pp 138–143
11.
Zurück zum Zitat Lin CC, Lai YC, Tygar JD, Yang CK, Chiang CL (2007) Coexistence proof using chain of timestamps for multiple RFID tags. In: Proceedings of advances in web and network technologies and information management, LNCS, vol 4537, pp 634–643 Lin CC, Lai YC, Tygar JD, Yang CK, Chiang CL (2007) Coexistence proof using chain of timestamps for multiple RFID tags. In: Proceedings of advances in web and network technologies and information management, LNCS, vol 4537, pp 634–643
12.
Zurück zum Zitat Cho J, Yeo S, Hwang S, Rhee S, Kim S (2008) In: Enhanced Yoking proof protocols for RFID tags and tag groups. In: 22nd international conference on advanced information networking and applications, pp 1591–1596 Cho J, Yeo S, Hwang S, Rhee S, Kim S (2008) In: Enhanced Yoking proof protocols for RFID tags and tag groups. In: 22nd international conference on advanced information networking and applications, pp 1591–1596
13.
Zurück zum Zitat Saito J, Sakurai K (2005) Grouping proof for RFID tags. In: Proceedings of the 19th international conference on advanced information networking and applications (AINA’05), pp 621–624 Saito J, Sakurai K (2005) Grouping proof for RFID tags. In: Proceedings of the 19th international conference on advanced information networking and applications (AINA’05), pp 621–624
14.
Zurück zum Zitat Piramuthu S (2006) On existence proofs for multiple RFID Tags. In: IEEE Computer Society Press. IEEE international conference on pervasive services, workshop on security, privacy and trust in pervasive and ubiquitous computing–SecPerU 2006, pp 317–320 Piramuthu S (2006) On existence proofs for multiple RFID Tags. In: IEEE Computer Society Press. IEEE international conference on pervasive services, workshop on security, privacy and trust in pervasive and ubiquitous computing–SecPerU 2006, pp 317–320
15.
Zurück zum Zitat Jung Y, Kim H, Lee A, Jun M (2012) Study on 2BP distance bounding protocol to prevent relay attack in RFID environment. In: KIPS Conference 2012, Korea Information Processing Society Jung Y, Kim H, Lee A, Jun M (2012) Study on 2BP distance bounding protocol to prevent relay attack in RFID environment. In: KIPS Conference 2012, Korea Information Processing Society
16.
Zurück zum Zitat EPC Global Inc. (2008) EPCTM radio frequency identity protocols C1G2 UHF RFID Protocol Ver1.2.0 EPC Global Inc. (2008) EPCTM radio frequency identity protocols C1G2 UHF RFID Protocol Ver1.2.0
17.
Zurück zum Zitat Jung H (2015) A memory efficient anti-collision protocol to identify memoryless RFID tags. J Inf Process Syst 11(1):95–103MathSciNet Jung H (2015) A memory efficient anti-collision protocol to identify memoryless RFID tags. J Inf Process Syst 11(1):95–103MathSciNet
18.
Zurück zum Zitat Dahane A, Berrached N-E, Loukil A (2015) A virtual laboratory to practice mobile wireless sensor networks: a case study on energy efficient and safe weighted clustering algorithm. J Inf Process Syst 11(2):205–228 Dahane A, Berrached N-E, Loukil A (2015) A virtual laboratory to practice mobile wireless sensor networks: a case study on energy efficient and safe weighted clustering algorithm. J Inf Process Syst 11(2):205–228
19.
Zurück zum Zitat Malhotra N, Nagpal G (2015) Genetic symmetric key generation for IDEA. J Inf Process Syst 11(2):239–247 Malhotra N, Nagpal G (2015) Genetic symmetric key generation for IDEA. J Inf Process Syst 11(2):239–247
Metadaten
Titel
Lightweight mutual authentication RFID protocol for secure multi-tag simultaneous authentication in ubiquitous environments
verfasst von
Jungho Kang
Publikationsdatum
21.07.2016
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 8/2019
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-016-1788-6

Weitere Artikel der Ausgabe 8/2019

The Journal of Supercomputing 8/2019 Zur Ausgabe