Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 6/2021

10.07.2021

URASP: An ultralightweight RFID authentication scheme using permutation operation

verfasst von: Mohd Shariq, Karan Singh, Pramod Kumar Maurya, Ali Ahmadian, Muhammad Rezal Kamel Ariffin

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 6/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to low-cost, ease of use and convenience, Radio Frequency IDentification (RFID) is a contactless technology that has become more and more promising for automatic identification of an object and people without physical contact. However, the RFID system faces major issues related to its security and privacy, where an adversary may eavesdrop, temper, modify, and intercept the transmitted messages over a communication channel. To overcome these issues, there is a flexible and effective way to implement an ultralightweight RFID scheme. Therefore, we present an ultralightweight RFID authentication scheme using permutation operation named URASP in this paper. Our proposed scheme integrates permutation and left rotate operation to provide a higher level of security and privacy without increasing storage and computation overhead. In addition, the informal analysis of our proposal illustrates its ability to overcome all known security attacks. We show that the proposed URASP scheme preserves the properties of tags untraceability and information privacy by using Juels and Weis privacy model. The performance analysis has been performed which demonstrates that the proposed scheme outperforms other existing schemes as well as utilizes fewer resources on tags. The verification of our scheme has been done using Scyther simulation tool. Thereafter, the correctness of our scheme has been verified by using BAN logic inference rules. Hence, the proposed scheme is more suited for low-cost passive RFID tags.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Adeli M, Bagheri N, Sadeghi S, Kumari S (2021) χ perbp: a cloud-based lightweight mutual authentication protocol Adeli M, Bagheri N, Sadeghi S, Kumari S (2021) χ perbp: a cloud-based lightweight mutual authentication protocol
2.
Zurück zum Zitat Aghili SF, Mala H (2019) Security analysis of an ultra-lightweight rfid authentication protocol for m-commerce. Int J Commun Syst 32(3):e3837CrossRef Aghili SF, Mala H (2019) Security analysis of an ultra-lightweight rfid authentication protocol for m-commerce. Int J Commun Syst 32(3):e3837CrossRef
3.
Zurück zum Zitat Aghili SF, Mala H (2020) Tracking and impersonating tags in a crc-based ultralightweight rfid authentication protocol. Peer-to-Peer Netw Appl 13(3):816–824CrossRef Aghili SF, Mala H (2020) Tracking and impersonating tags in a crc-based ultralightweight rfid authentication protocol. Peer-to-Peer Netw Appl 13(3):816–824CrossRef
4.
Zurück zum Zitat Ahmadian Z, Salmasizadeh M, Aref MR (2013) Desynchronization attack on rapp ultralightweight authentication protocol. Inf Proc Lett 113(7):205–209MathSciNetMATHCrossRef Ahmadian Z, Salmasizadeh M, Aref MR (2013) Desynchronization attack on rapp ultralightweight authentication protocol. Inf Proc Lett 113(7):205–209MathSciNetMATHCrossRef
5.
Zurück zum Zitat Akgün M, Caglayan MU (2013) On the security of recently proposed rfid protocols. IACR Cryptol ePrint Arch 2013:820 Akgün M, Caglayan MU (2013) On the security of recently proposed rfid protocols. IACR Cryptol ePrint Arch 2013:820
6.
Zurück zum Zitat Bringer J, Chabanne H, Dottax E (2006) A lightweight authentication protocol secure against some attacks. IEEE Computer Society Washington, DC, USA Bringer J, Chabanne H, Dottax E (2006) A lightweight authentication protocol secure against some attacks. IEEE Computer Society Washington, DC, USA
7.
Zurück zum Zitat Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc London A Math Phys Sci 426(1871):233–271MathSciNetMATH Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc London A Math Phys Sci 426(1871):233–271MathSciNetMATH
8.
Zurück zum Zitat Cao T, Chen X, Doss R, Zhai J, Wise LJ, Zhao Q (2016) Rfid ownership transfer protocol based on cloud. Comput Netw 105:47–59CrossRef Cao T, Chen X, Doss R, Zhai J, Wise LJ, Zhao Q (2016) Rfid ownership transfer protocol based on cloud. Comput Netw 105:47–59CrossRef
9.
Zurück zum Zitat Chien HY (2006) Secure access control schemes for rfid systems with anonymity. In: 7th International conference on mobile data management (MDM’06), IEEE, pp 96–96 Chien HY (2006) Secure access control schemes for rfid systems with anonymity. In: 7th International conference on mobile data management (MDM’06), IEEE, pp 96–96
10.
Zurück zum Zitat Chien HY (2007) Sasi: A new ultralightweight rfid authentication protocol providing strong authentication and strong integrity. IEEE Trans Depend Secure Comput 4(4):337–340CrossRef Chien HY (2007) Sasi: A new ultralightweight rfid authentication protocol providing strong authentication and strong integrity. IEEE Trans Depend Secure Comput 4(4):337–340CrossRef
11.
Zurück zum Zitat Chien HY, Chen CH (2007) Mutual authentication protocol for rfid conforming to epc class 1 generation 2 standards. Comput Stand Inter 29(2):254–259MathSciNetCrossRef Chien HY, Chen CH (2007) Mutual authentication protocol for rfid conforming to epc class 1 generation 2 standards. Comput Stand Inter 29(2):254–259MathSciNetCrossRef
12.
Zurück zum Zitat Chien HY, Huang CW (2007) Security of ultra-lightweight rfid authentication protocols and its improvements. ACM SIGOPS Oper Syst Rev 41(4):83–86CrossRef Chien HY, Huang CW (2007) Security of ultra-lightweight rfid authentication protocols and its improvements. ACM SIGOPS Oper Syst Rev 41(4):83–86CrossRef
13.
Zurück zum Zitat Cho JS, Jeong YS, Park SO (2015) Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (rfid) tag mutual authentication protocol. Comput Math Appl 69(1):58–65MATHCrossRef Cho JS, Jeong YS, Park SO (2015) Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (rfid) tag mutual authentication protocol. Comput Math Appl 69(1):58–65MATHCrossRef
14.
Zurück zum Zitat Cremers CJ (2008) The scyther tool: Verification, falsification, and analysis of security protocols. In: International conference on computer aided verification, Springer, pp 414–418 Cremers CJ (2008) The scyther tool: Verification, falsification, and analysis of security protocols. In: International conference on computer aided verification, Springer, pp 414–418
15.
Zurück zum Zitat Cremers CJF (2006) Scyther: Semantics and verification of security protocols. Eindhoven University of Technology Eindhoven, Netherlands Cremers CJF (2006) Scyther: Semantics and verification of security protocols. Eindhoven University of Technology Eindhoven, Netherlands
16.
Zurück zum Zitat D’Arco P, De Prisco R (2018) Design weaknesses in recent ultralightweight rfid authentication protocols. In: IFIP International conference on ICT systems security and privacy protection, Springer, pp 3–17 D’Arco P, De Prisco R (2018) Design weaknesses in recent ultralightweight rfid authentication protocols. In: IFIP International conference on ICT systems security and privacy protection, Springer, pp 3–17
17.
Zurück zum Zitat Dimitriou T (2016) Key evolving rfid systems: Forward/backward privacy and ownership transfer of rfid tags. Ad Hoc Netw 37:195–208CrossRef Dimitriou T (2016) Key evolving rfid systems: Forward/backward privacy and ownership transfer of rfid tags. Ad Hoc Netw 37:195–208CrossRef
18.
Zurück zum Zitat Duc DN, Park J, Lee H, Kim K (2006) Enhancing security of epcglobal gen-2 rfid tag against traceability and cloning. In: SCIS 2006, institute of electronics, information and communication engineers Duc DN, Park J, Lee H, Kim K (2006) Enhancing security of epcglobal gen-2 rfid tag against traceability and cloning. In: SCIS 2006, institute of electronics, information and communication engineers
19.
Zurück zum Zitat Fan K, Ge N, Gong Y, Li H, Su R, Yang Y (2017) An ultra-lightweight rfid authentication scheme for mobile commerce. Peer-to-peer Netw Appl 10(2):368–376CrossRef Fan K, Ge N, Gong Y, Li H, Su R, Yang Y (2017) An ultra-lightweight rfid authentication scheme for mobile commerce. Peer-to-peer Netw Appl 10(2):368–376CrossRef
20.
Zurück zum Zitat Fan K, Luo Q, Zhang K, Yang Y (2020) Cloud-based lightweight secure rfid mutual authentication protocol in iot. Inform Sci 527:329–340MathSciNetMATHCrossRef Fan K, Luo Q, Zhang K, Yang Y (2020) Cloud-based lightweight secure rfid mutual authentication protocol in iot. Inform Sci 527:329–340MathSciNetMATHCrossRef
21.
Zurück zum Zitat Gao L, Ma M, Shu Y, Wei Y (2014) An ultralightweight rfid authentication protocol with crc and permutation. J Netw Comput Appl 41:37–46CrossRef Gao L, Ma M, Shu Y, Wei Y (2014) An ultralightweight rfid authentication protocol with crc and permutation. J Netw Comput Appl 41:37–46CrossRef
22.
Zurück zum Zitat Gao L, Zhang L, Lin F, Ma M (2019) Secure rfid authentication schemes based on security analysis and improvements of the usi protocol. IEEE Access 7:8376–8384CrossRef Gao L, Zhang L, Lin F, Ma M (2019) Secure rfid authentication schemes based on security analysis and improvements of the usi protocol. IEEE Access 7:8376–8384CrossRef
23.
Zurück zum Zitat Gilbert H, Robshaw M, Sibert H (2005) Active attack against hb/sup: a provably secure lightweight authentication protocol. Electron Lett 41(21):1169–1170CrossRef Gilbert H, Robshaw M, Sibert H (2005) Active attack against hb/sup: a provably secure lightweight authentication protocol. Electron Lett 41(21):1169–1170CrossRef
24.
Zurück zum Zitat He D, Zeadally S (2014) An analysis of rfid authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Int Things J 2(1):72– 83CrossRef He D, Zeadally S (2014) An analysis of rfid authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Int Things J 2(1):72– 83CrossRef
25.
Zurück zum Zitat Henrici D, Muller P (2004) Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: IEEE Annual conference on pervasive computing and communications workshops, 2004. Proceedings of the Second, IEEE, pp 149–153 Henrici D, Muller P (2004) Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: IEEE Annual conference on pervasive computing and communications workshops, 2004. Proceedings of the Second, IEEE, pp 149–153
26.
Zurück zum Zitat Hosseinzadeh M, Ahmed OH, Ahmed SH, Trinh C, Bagheri N, Kumari S, Lansky J, Huynh B (2020) An enhanced authentication protocol for rfid systems. IEEE Access 8:126977–126987CrossRef Hosseinzadeh M, Ahmed OH, Ahmed SH, Trinh C, Bagheri N, Kumari S, Lansky J, Huynh B (2020) An enhanced authentication protocol for rfid systems. IEEE Access 8:126977–126987CrossRef
27.
Zurück zum Zitat Ibrahim A (2019) Review of different classes of rfid authentication protocols. Wireless Netw 25 (3):961–974CrossRef Ibrahim A (2019) Review of different classes of rfid authentication protocols. Wireless Netw 25 (3):961–974CrossRef
28.
Zurück zum Zitat Jeon IS, Yoon EJ (2013) A new ultra-lightweight rfid authentication protocol using merge and separation operations. Int J Math Anal 7(52):2583–2593CrossRef Jeon IS, Yoon EJ (2013) A new ultra-lightweight rfid authentication protocol using merge and separation operations. Int J Math Anal 7(52):2583–2593CrossRef
29.
Zurück zum Zitat Juels A, Weis SA (2009) Defining strong privacy for rfid. ACM Trans Inf Syst Sec (TISSEC) 13(1):1–23CrossRef Juels A, Weis SA (2009) Defining strong privacy for rfid. ACM Trans Inf Syst Sec (TISSEC) 13(1):1–23CrossRef
30.
Zurück zum Zitat Juels A, Molnar D, Wagner D (2005) Security and privacy issues in e-passports. In: First international conference on security and privacy for emerging areas in communications networks (SECURECOMM’05), IEEE, pp 74–88 Juels A, Molnar D, Wagner D (2005) Security and privacy issues in e-passports. In: First international conference on security and privacy for emerging areas in communications networks (SECURECOMM’05), IEEE, pp 74–88
31.
Zurück zum Zitat Kinoshita S, Ohkubo M, Hoshino F, Morohashi G, Shionoiri O, Kanai A (2005) Privacy enhanced active rfid tag. Cognitive Science Research Paper-University of Sussex CSRP 577: 100 Kinoshita S, Ohkubo M, Hoshino F, Morohashi G, Shionoiri O, Kanai A (2005) Privacy enhanced active rfid tag. Cognitive Science Research Paper-University of Sussex CSRP 577: 100
32.
Zurück zum Zitat Kumar A, Jain AK (2021) Mutual authentication protocol for low cost passive tag in RFID system. Int J Inf Technol 13(3):1209–1215MathSciNet Kumar A, Jain AK (2021) Mutual authentication protocol for low cost passive tag in RFID system. Int J Inf Technol 13(3):1209–1215MathSciNet
33.
Zurück zum Zitat Kumar S, Paar C (2006) Are standards compliant elliptic curve cryptosystems feasible on rfid. In: Workshop on RFID security, Citeseer, pp 12–14 Kumar S, Paar C (2006) Are standards compliant elliptic curve cryptosystems feasible on rfid. In: Workshop on RFID security, Citeseer, pp 12–14
34.
Zurück zum Zitat Li T, Deng R (2007) Vulnerability analysis of emap-an efficient rfid mutual authentication protocol. In: The second international conference on availability, reliability and security (ARES’07), IEEE, pp 238–245 Li T, Deng R (2007) Vulnerability analysis of emap-an efficient rfid mutual authentication protocol. In: The second international conference on availability, reliability and security (ARES’07), IEEE, pp 238–245
35.
Zurück zum Zitat Li T, Wang G (2007) Security analysis of two ultra-lightweight rfid authentication protocols. In: IFIP international information security conference, Springer, pp 109–120 Li T, Wang G (2007) Security analysis of two ultra-lightweight rfid authentication protocols. In: IFIP international information security conference, Springer, pp 109–120
36.
Zurück zum Zitat Liu Y, Ezerman MF, Wang H (2019a) Double verification protocol via secret sharing for low-cost rfid tags. Futur Gener Comput Syst 90:118–128CrossRef Liu Y, Ezerman MF, Wang H (2019a) Double verification protocol via secret sharing for low-cost rfid tags. Futur Gener Comput Syst 90:118–128CrossRef
37.
Zurück zum Zitat Liu Y, Sun Q, Wang Y, Zhu L, Ji W (2019b) Efficient group authentication in rfid using secret sharing scheme. Clust Comput 22(4):8605–8611CrossRef Liu Y, Sun Q, Wang Y, Zhu L, Ji W (2019b) Efficient group authentication in rfid using secret sharing scheme. Clust Comput 22(4):8605–8611CrossRef
38.
Zurück zum Zitat Liu Y, Yin X, Dong Y, Huang K (2019c) Lightweight authentication scheme with inverse operation on passive rfid tags. J Chin Inst Eng 42(1):74–79CrossRef Liu Y, Yin X, Dong Y, Huang K (2019c) Lightweight authentication scheme with inverse operation on passive rfid tags. J Chin Inst Eng 42(1):74–79CrossRef
39.
Zurück zum Zitat Luo H, Wen G, Su J, Huang Z (2018) Slap: Succinct and lightweight authentication protocol for low-cost rfid system. Wirel Netw 24(1):69–78CrossRef Luo H, Wen G, Su J, Huang Z (2018) Slap: Succinct and lightweight authentication protocol for low-cost rfid system. Wirel Netw 24(1):69–78CrossRef
40.
Zurück zum Zitat Maurya PK, Bagchi S (2018) A secure puf-based unilateral authentication scheme for rfid system. Wirel Pers Commun 103(2):1699–1712CrossRef Maurya PK, Bagchi S (2018) A secure puf-based unilateral authentication scheme for rfid system. Wirel Pers Commun 103(2):1699–1712CrossRef
41.
Zurück zum Zitat Maurya PK, Pal J, Bagchi S (2017) A coding theory based ultralightweight rfid authentication protocol with crc. Wirel Pers Commun 97(1):967–976CrossRef Maurya PK, Pal J, Bagchi S (2017) A coding theory based ultralightweight rfid authentication protocol with crc. Wirel Pers Commun 97(1):967–976CrossRef
42.
Zurück zum Zitat Mujahid U, Najam-ul Islam M, Shami MA (2015) Rcia: A new ultralightweight rfid authentication protocol using recursive hash. Int J Distrib Sensor Netw 11(1):642180CrossRef Mujahid U, Najam-ul Islam M, Shami MA (2015) Rcia: A new ultralightweight rfid authentication protocol using recursive hash. Int J Distrib Sensor Netw 11(1):642180CrossRef
43.
Zurück zum Zitat Mujahid U, Najam-ul Islam M, Sarwar S (2017) A new ultralightweight rfid authentication protocol for passive low cost tags: Kmap. Wirel Pers Commun 94(3):725–744CrossRef Mujahid U, Najam-ul Islam M, Sarwar S (2017) A new ultralightweight rfid authentication protocol for passive low cost tags: Kmap. Wirel Pers Commun 94(3):725–744CrossRef
44.
Zurück zum Zitat Pakniat N, Eslami Z (2020) Cryptanalysis and improvement of a group rfid authentication protocol. Wirel Netw 26(5):3363–3372CrossRef Pakniat N, Eslami Z (2020) Cryptanalysis and improvement of a group rfid authentication protocol. Wirel Netw 26(5):3363–3372CrossRef
45.
Zurück zum Zitat Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006a) Emap: An efficient mutual-authentication protocol for low-cost rfid tags. In: OTM Confederated international conferences” on the move to meaningful internet systems”, Springer, pp 352–361 Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006a) Emap: An efficient mutual-authentication protocol for low-cost rfid tags. In: OTM Confederated international conferences” on the move to meaningful internet systems”, Springer, pp 352–361
46.
Zurück zum Zitat Peris-Lopez P, Hernandez-Castro JC, Estévez-Tapiador JM, Ribagorda A (2006b) Lmap: A real lightweight mutual authentication protocol for low-cost rfid tags. In: Proc. of 2nd workshop on RFID security, vol 6 Peris-Lopez P, Hernandez-Castro JC, Estévez-Tapiador JM, Ribagorda A (2006b) Lmap: A real lightweight mutual authentication protocol for low-cost rfid tags. In: Proc. of 2nd workshop on RFID security, vol 6
47.
Zurück zum Zitat Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006c) M2AP: a minimalist mutual-authentication protocol for low-cost rfid tags. In: International conference on ubiquitous intelligence and computing, Springer, pp 912–923 Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006c) M2AP: a minimalist mutual-authentication protocol for low-cost rfid tags. In: International conference on ubiquitous intelligence and computing, Springer, pp 912–923
48.
Zurück zum Zitat Safkhani M, Bagheri N (2016) Generalized desynchronization attack on umap: Application to rcia, kmap, slap and sasi+ protocols. IACR Cryptol ePrint Arch 2016:905 Safkhani M, Bagheri N (2016) Generalized desynchronization attack on umap: Application to rcia, kmap, slap and sasi+ protocols. IACR Cryptol ePrint Arch 2016:905
49.
Zurück zum Zitat Safkhani M, Rostampour S, Bendavid Y, Bagheri N (2020) Iot in medical & pharmaceutical: Designing lightweight rfid security protocols for ensuring supply chain integrity. Comput Netw 181:107558CrossRef Safkhani M, Rostampour S, Bendavid Y, Bagheri N (2020) Iot in medical & pharmaceutical: Designing lightweight rfid security protocols for ensuring supply chain integrity. Comput Netw 181:107558CrossRef
50.
Zurück zum Zitat Salem FM, Amin R (2020) A privacy-preserving rfid authentication protocol based on el-gamal cryptosystem for secure tmis. Inform Sci 527:382–393MathSciNetMATHCrossRef Salem FM, Amin R (2020) A privacy-preserving rfid authentication protocol based on el-gamal cryptosystem for secure tmis. Inform Sci 527:382–393MathSciNetMATHCrossRef
51.
Zurück zum Zitat Shariq M, Singh K (2021) A novel vector-space-based lightweight privacy-preserving rfid authentication protocol for iot environment. J Supercomput pp 1–31 Shariq M, Singh K (2021) A novel vector-space-based lightweight privacy-preserving rfid authentication protocol for iot environment. J Supercomput pp 1–31
52.
Zurück zum Zitat Srivastava K, Awasthi AK, Kaul SD, Mittal R (2015) A hash based mutual rfid tag authentication protocol in telecare medicine information system. J Med Syst 39(1):1–5CrossRef Srivastava K, Awasthi AK, Kaul SD, Mittal R (2015) A hash based mutual rfid tag authentication protocol in telecare medicine information system. J Med Syst 39(1):1–5CrossRef
53.
Zurück zum Zitat Tewari A, Gupta B (2017) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for iot devices using rfid tags. J Supercomput 73(3):1085–1102CrossRef Tewari A, Gupta B (2017) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for iot devices using rfid tags. J Supercomput 73(3):1085–1102CrossRef
54.
Zurück zum Zitat Tian Y, Chen G, Li J (2012) A new ultralightweight rfid authentication protocol with permutation. IEEE Commun Lett 16(5):702–705CrossRef Tian Y, Chen G, Li J (2012) A new ultralightweight rfid authentication protocol with permutation. IEEE Commun Lett 16(5):702–705CrossRef
55.
Zurück zum Zitat Trinh C, Huynh B, Lansky J, Mildeova S, Safkhani M, Bagheri N, Kumari S, Hosseinzadeh M (2020) A novel lightweight block cipher-based mutual authentication protocol for constrained environments. IEEE Access 8:165536–165550CrossRef Trinh C, Huynh B, Lansky J, Mildeova S, Safkhani M, Bagheri N, Kumari S, Hosseinzadeh M (2020) A novel lightweight block cipher-based mutual authentication protocol for constrained environments. IEEE Access 8:165536–165550CrossRef
56.
Zurück zum Zitat Wang KH, Chen CM, Fang W, Wu TY (2018) On the security of a new ultra-lightweight authentication protocol in iot environment for rfid tags. J Supercomput 74(1):65–70CrossRef Wang KH, Chen CM, Fang W, Wu TY (2018) On the security of a new ultra-lightweight authentication protocol in iot environment for rfid tags. J Supercomput 74(1):65–70CrossRef
57.
Zurück zum Zitat Weis SA (2003) Security and privacy in radio-frequency identification devices. PhD thesis, Massachusetts Institute of Technology Weis SA (2003) Security and privacy in radio-frequency identification devices. PhD thesis, Massachusetts Institute of Technology
58.
Zurück zum Zitat Weis SA, Sarma SE, Rivest RL, Engels DW (2004) Security and privacy aspects of low-cost radio frequency identification systems. In: Security in pervasive computing, Springer, pp 201–212 Weis SA, Sarma SE, Rivest RL, Engels DW (2004) Security and privacy aspects of low-cost radio frequency identification systems. In: Security in pervasive computing, Springer, pp 201–212
59.
Zurück zum Zitat Xiao L, Xu H, Zhu F, Wang R, Li P (2020) Skinny-based rfid lightweight authentication protocol. Sensors 20(5):1366CrossRef Xiao L, Xu H, Zhu F, Wang R, Li P (2020) Skinny-based rfid lightweight authentication protocol. Sensors 20(5):1366CrossRef
60.
Zurück zum Zitat Xie S, Zhang F, Cheng R (2021) Security enhanced RFID authentication protocols for healthcare environment. Wireless Pers Commun 117:71–86CrossRef Xie S, Zhang F, Cheng R (2021) Security enhanced RFID authentication protocols for healthcare environment. Wireless Pers Commun 117:71–86CrossRef
61.
Zurück zum Zitat Yang J, Park J, Lee H, Ren K, Kim K (2005a) Mutual authentication protocol for low-cost rfid. In: Workshop on RFID and lightweight crypto, WRLC, pp 17–24 Yang J, Park J, Lee H, Ren K, Kim K (2005a) Mutual authentication protocol for low-cost rfid. In: Workshop on RFID and lightweight crypto, WRLC, pp 17–24
62.
Zurück zum Zitat Yang J, Ren K, Kim K (2005b) Security and privacy on authentication protocol for low-cost rfid. In: Symposium on cryptography and information security Yang J, Ren K, Kim K (2005b) Security and privacy on authentication protocol for low-cost rfid. In: Symposium on cryptography and information security
63.
Zurück zum Zitat Zhuang X, Wang ZH, Chang CC, Zhu Y (2013) Security analysis of a new ultra-lightweight rfid protocol and its improvement. J Inf Hiding Multimed Signal Proc 4(3):166–177 Zhuang X, Wang ZH, Chang CC, Zhu Y (2013) Security analysis of a new ultra-lightweight rfid protocol and its improvement. J Inf Hiding Multimed Signal Proc 4(3):166–177
Metadaten
Titel
URASP: An ultralightweight RFID authentication scheme using permutation operation
verfasst von
Mohd Shariq
Karan Singh
Pramod Kumar Maurya
Ali Ahmadian
Muhammad Rezal Kamel Ariffin
Publikationsdatum
10.07.2021
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 6/2021
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-021-01192-5

Weitere Artikel der Ausgabe 6/2021

Peer-to-Peer Networking and Applications 6/2021 Zur Ausgabe

Premium Partner