Skip to main content
Erschienen in: Wireless Personal Communications 1/2013

01.09.2013

Tree-LSHB+: An LPN-Based Lightweight Mutual Authentication RFID Protocol

verfasst von: Guanyang Deng, Hui Li, Ying Zhang, Jun Wang

Erschienen in: Wireless Personal Communications | Ausgabe 1/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we propose an enhancement of the Tree-based authentication protocol, named as the Tree-LSHB+ protocol. The protocol is a lightweight authentication protocol that is suitable for use in radio frequency identification (RFID) systems. Compared with the Tree-based HB authentication protocol, our protocol provides mutual authentication in authentication stage. The authentication keys stored in the reader and the tag are also updated when the mutual authentication succeeds. It means that two drawbacks can be avoided in the Tree-based authentication protocol, one is that only the reader authenticates the tag and the other is that the secret keys stored in the tags remain unchanged all the time. We also improve the performance of Tree-based protocol with the property of Toeplitz matrix and find that the Tree-LSHB+ protocol is still a good choice for RFID authentication.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hopper, N. J., & Blum, M. (2000). A secure human-computer authentication scheme. Technical report CMU-CS-00-139, Carnegie Mellon University, 2000. Hopper, N. J., & Blum, M. (2000). A secure human-computer authentication scheme. Technical report CMU-CS-00-139, Carnegie Mellon University, 2000.
2.
Zurück zum Zitat Juels, A., & Weis, S. (2005). Authenticating pervasive devices with human protocols. In Advances in cryptology—crypto 2005, lecture notes in computer science (Vol. 3621, pp. 293–308). Juels, A., & Weis, S. (2005). Authenticating pervasive devices with human protocols. In Advances in cryptology—crypto 2005, lecture notes in computer science (Vol. 3621, pp. 293–308).
3.
4.
Zurück zum Zitat Gilbert, H., Robshaw, M., & Silbert, H. (2005). An active attack against HB+-a provable secure lightweighted authentication protocol. Cryptology ePrint archive, report 2005/237. http://eprint.iacr.org. Gilbert, H., Robshaw, M., & Silbert, H. (2005). An active attack against HB+-a provable secure lightweighted authentication protocol. Cryptology ePrint archive, report 2005/237. http://​eprint.​iacr.​org.
5.
Zurück zum Zitat Munilla, J., & Peinado, A. (2007). HP-MP: A further step in the HB-family of lightweight authentication protocols. Computer Networks, 51, 2262–2267.MATHCrossRef Munilla, J., & Peinado, A. (2007). HP-MP: A further step in the HB-family of lightweight authentication protocols. Computer Networks, 51, 2262–2267.MATHCrossRef
6.
Zurück zum Zitat Leng, X., Mayes, K., & Markantonakis, K. (2008). HB-MP+ protocol: An improvement on the HB-MP protocol. In IEEE international conference on RFID (pp. 118–124), April 2008. Leng, X., Mayes, K., & Markantonakis, K. (2008). HB-MP+ protocol: An improvement on the HB-MP protocol. In IEEE international conference on RFID (pp. 118–124), April 2008.
7.
Zurück zum Zitat Gilbert, H., Robshaw, M., & Seurin, Y. (2008). HB#: Increasing the security and efficiency of HB+. In EUROCRYPT 2008 (pp. 361–387). Gilbert, H., Robshaw, M., & Seurin, Y. (2008). HB#: Increasing the security and efficiency of HB+. In EUROCRYPT 2008 (pp. 361–387).
8.
Zurück zum Zitat Krawczyk, H. (1994). LFSR-based hashing and authentication. In CRYPTO. Lecture notes in computer science (Vol. 839, pp. 129–139). Krawczyk, H. (1994). LFSR-based hashing and authentication. In CRYPTO. Lecture notes in computer science (Vol. 839, pp. 129–139).
9.
Zurück zum Zitat Krawczyk, H. (1995). New hash functions for message authentication. In Proceedings of eurocrypt, 1995 (Vol. 950, pp. 301–310). Krawczyk, H. (1995). New hash functions for message authentication. In Proceedings of eurocrypt, 1995 (Vol. 950, pp. 301–310).
10.
Zurück zum Zitat Madhavan, M., Thangaraj, A., & Sankarasubramaniam, Y., et al. (2010). A non-linear hopper blum protocol. In IEEE national conference on communications (NCC) (pp. 2498–2502). Madhavan, M., Thangaraj, A., & Sankarasubramaniam, Y., et al. (2010). A non-linear hopper blum protocol. In IEEE national conference on communications (NCC) (pp. 2498–2502).
11.
Zurück zum Zitat Madhavan, M., Thangaraj, A., & Sankarasubramaniam, Y., et al. (2010). NLHB: A light-weight, provably-secure variant of the HB protocol using simple non-linear functions. In Proceedings of 16th national conference on communications NCC 2010 (pp. 1–5). Madhavan, M., Thangaraj, A., & Sankarasubramaniam, Y., et al. (2010). NLHB: A light-weight, provably-secure variant of the HB protocol using simple non-linear functions. In Proceedings of 16th national conference on communications NCC 2010 (pp. 1–5).
12.
Zurück zum Zitat Bosley, C., Haralambiev, K., & Nicolosi, A. (2011). HBN: An HB-like protocol secure against man-in-the-middle attacks. Cryptology ePrint archive, report 2011/350. Bosley, C., Haralambiev, K., & Nicolosi, A. (2011). HBN: An HB-like protocol secure against man-in-the-middle attacks. Cryptology ePrint archive, report 2011/350.
13.
Zurück zum Zitat Rizomiliotis, P., & Gritzalis, S. (2012). GHB#: A provably secure HB-like lightweight authentication protocol, applied cryptography and network security. In 10th international conference, lecture notes in computer science v7341 LNCS (pp. 489–506). Rizomiliotis, P., & Gritzalis, S. (2012). GHB#: A provably secure HB-like lightweight authentication protocol, applied cryptography and network security. In 10th international conference, lecture notes in computer science v7341 LNCS (pp. 489–506).
14.
Zurück zum Zitat Song, B., & Mitchell, C. J. (2011). Scalable RFID security protocols supporting tag ownership transfer. Computer Communications, 34(4), 556–566.CrossRef Song, B., & Mitchell, C. J. (2011). Scalable RFID security protocols supporting tag ownership transfer. Computer Communications, 34(4), 556–566.CrossRef
15.
Zurück zum Zitat Habibi, M. H., & Aref, M. R. (2012). Security and privacy analysis of song-mitchell RFID authentication protocol. Wireless Personal Communications. doi:10.1007/s11277-012-0652-0. Habibi, M. H., & Aref, M. R. (2012). Security and privacy analysis of song-mitchell RFID authentication protocol. Wireless Personal Communications. doi:10.​1007/​s11277-012-0652-0.
17.
Zurück zum Zitat Halevi, T., Saxena, N., & Halevi, S. (2009). Using HB family of protocols for privacy-preserving authentication of RFID tags in a population. In Workshop on RFID security—RFIDSec’09, Leuven, July 2009. Halevi, T., Saxena, N., & Halevi, S. (2009). Using HB family of protocols for privacy-preserving authentication of RFID tags in a population. In Workshop on RFID security—RFIDSec’09, Leuven, July 2009.
18.
Zurück zum Zitat Halevi, T., Saxena, N., & Halevi, S. (2011). Tree-based HB protocols for privacy-preserving authentication of RFID tags. Journal of Computer Security, 19(2), 343–363. Halevi, T., Saxena, N., & Halevi, S. (2011). Tree-based HB protocols for privacy-preserving authentication of RFID tags. Journal of Computer Security, 19(2), 343–363.
19.
Zurück zum Zitat Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: Issues, practices, and architectures. In ACM conference on computer and communications security—ACM CCS’04 (pp. 210–219). Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: Issues, practices, and architectures. In ACM conference on computer and communications security—ACM CCS’04 (pp. 210–219).
20.
Zurück zum Zitat Berlekamp, E. R., McEliece, R. J., & Tilborg, V. (1978). On the inherent intractability of certain coding problems. IEEE Transactions on Information Theory, 24, 384–386.MATHCrossRef Berlekamp, E. R., McEliece, R. J., & Tilborg, V. (1978). On the inherent intractability of certain coding problems. IEEE Transactions on Information Theory, 24, 384–386.MATHCrossRef
21.
Zurück zum Zitat Bringer, J., & Chabanne, H. (2008). Trusted-HB: A low-cost version of HB+ secure against man-in-the-middle attacks. IEEE Transaction on Information Theory, 54(9), 4339–4342.MathSciNetCrossRef Bringer, J., & Chabanne, H. (2008). Trusted-HB: A low-cost version of HB+ secure against man-in-the-middle attacks. IEEE Transaction on Information Theory, 54(9), 4339–4342.MathSciNetCrossRef
22.
Zurück zum Zitat Yang, J., Park, J., Lee, H., Ren, K., & Kim, K. (2005). Mutual authentication protocol for low-cost RFID. In Proceedings of workshop on RFID and lightweight crypto (pp. 17–24). Yang, J., Park, J., Lee, H., Ren, K., & Kim, K. (2005). Mutual authentication protocol for low-cost RFID. In Proceedings of workshop on RFID and lightweight crypto (pp. 17–24).
23.
Zurück zum Zitat Ohkubo, M., Suzuki, K., & Kinoshita, S. (2003). Cryptographic approach to “privacy friendly” tags. In RFID privacy, workshop 2003. Ohkubo, M., Suzuki, K., & Kinoshita, S. (2003). Cryptographic approach to “privacy friendly” tags. In RFID privacy, workshop 2003.
Metadaten
Titel
Tree-LSHB+: An LPN-Based Lightweight Mutual Authentication RFID Protocol
verfasst von
Guanyang Deng
Hui Li
Ying Zhang
Jun Wang
Publikationsdatum
01.09.2013
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2013
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-013-1006-2

Weitere Artikel der Ausgabe 1/2013

Wireless Personal Communications 1/2013 Zur Ausgabe

Neuer Inhalt