Lightweight Mutual Authentication Protocols for Low Cost RFID Tags

被引:0
|
作者
AlSahly, Norah [1 ]
Al-Rodhaan, Mznah [1 ]
机构
[1] King Saud Univ, Dept Comp Sci, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
来源
关键词
Radio Frequency Identification (RFID); Gossamer Protocol; Ultra-lightweight Mutual Authentication Protocols (UMAP); Denial of Service (DoS) Attack; De-Synchronization; Mutual Authentication;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio Frequency Identification (RFID) is a promising technology that has been used in many different ways and served numerous purposes in many fields. As a result, a lot of sectors invest in it. However, as it offers advantages it is also associated with security risks. Which is a big issue since there is sensitive data can be exchanged using RFID technology that can compromise the privacy of the involved parties. Due to the importance of security and privacy, researches have developed Ultra-lightweight Mutual Authentication Protocols (UMAP) that were originally designed to prevent these vulnerabilities and then discovered later that it still has some. In this paper, Gossamer protocol that belongs to UMAP family (due to its simplicity and its low cost) will be discussed. The reason behind choosing this protocol that it is inspired by Strong Authentication and Strong Integrity protocol (SASI) scheme and developed to avoid its weaknesses [1]. Then again, another vulnerabilities have appeared in the Gossamer protocol and made it less secure and exposed to external attacks. This paper proposes two new solutions inspired by Gossamer protocol. These new protocols can prevent Denial of Service (Dos) attacks or de-synchronization attacks that can be successfully held against Gossamer protocol.
引用
收藏
页码:61 / 71
页数:11
相关论文
共 50 条
  • [31] Low cost minimal mutual authentication protocol for RFID
    Zhang, Xiang
    Baciu, George
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 620 - +
  • [32] On the Traceability of Tags in SUAP RFID Authentication Protocols
    Safkhani, Masoumeh
    Bagheri, Nasour
    Peris-Lopez, Pedro
    Mitrokotsa, Aikaterini
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON RFID-TECHNOLOGIES AND APPLICATIONS (RFID-TA), 2012,
  • [33] Authentication Protocols for an Object with Dynamic RFID Tags
    Piramuthu, Selwyn
    [J]. FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2018, 2018, 878 : 93 - 101
  • [34] A Survey on Low-cost RFID Authentication Protocols
    Syamsuddin, Irfan
    Han, Song
    Dillon, Tharam
    [J]. 2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2012, : 77 - 82
  • [35] Low-Cost Untraceable Authentication Protocols for RFID
    Lee, Yong Ki
    Batina, Lejla
    Singelee, Dave
    Verbauwhede, Ingrid
    [J]. WISEC 10: PROCEEDINGS ON THE THIRD ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2010, : 55 - 64
  • [36] An Efficient RFID Authentication Protocol for Low-cost Tags
    Liu, Yanfei
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 180 - 185
  • [37] A Novel RFID Authentication Protocol for Low-Cost Tags
    Wu, Dan
    Chen, Geng
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 43 - 46
  • [38] Authentication with low-cost RFID tags in mobile networks
    Yen, Chih-Ta
    Guo, Ming-Huang
    Lo, Nai-Wei
    Deng, Der-Jiunn
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 1021 - 1027
  • [39] Quantitative Analysis for Authentication of Low-cost RFID Tags
    Paparrizos, Ioannis
    Basagiannis, Stylianos
    Petridou, Sophia
    [J]. 2011 IEEE 36TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2011, : 295 - 298
  • [40] Noisy cryptographic protocols for low-cost RFID tags
    Chabanne, Herve
    Fumaroli, Guillaume
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (08) : 3562 - 3566