An Ultra-Lightweight Secure RFID Authentication Protocol for Low-Cost Tags

被引:0
|
作者
Kumar, Sanjeev [1 ]
Banka, Haider [2 ]
Kaushik, Baijnath [3 ]
Sharma, Surbhi [4 ]
机构
[1] ABES Inst Technol, Dept Comp Sci & Engn AI, Ghaziabad, India
[2] Indian Inst Technol Dhanbad, Dept Comp Sci & Engn, Dhanbad, India
[3] Shri Mata Vaishno Devi Univ, Dept Comp Sci & Engn, Katra, J&K, India
[4] Natl Inst Technol, Dept Comp Sci & Engn, Srinagar, J&K, India
关键词
Radiofrequency Identification; GNY logic; Security; Authentication; IOT; INTERNET; DEVICES; READER; CACHE;
D O I
10.1007/s11416-024-00533-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio-Frequency Identification Technology (RFID) is a non-contact identification technology based on radio waves. It is mainly comprised of an RFID reader and RFID tags where RFID tags store unique information while an RFID reader emits radio waves to interrogate the tag. RFID technology doesn't require a line of sight, so it can identify objects from a larger distance, and it has numerous applications in different areas like IoT (Internet of Things), IoV (Internet of Vehicles), etc. RFID technology relies on wireless communication for data transmission, so it is more prone to security attacks, and if security is compromised, then it may lead to disastrous results. To maintain security in RFID systems, there is a need to use some lightweight authentication protocols, as RFID tags have limited memory and less computation capabilities. This paper reviewed the three RFID-based lightweight authentication protocols, i.e. LRSAS + , LRARP, and LRARP + . Also, we have done the cryptanalysis of these lightweight protocols and found that they are unsuitable for low-cost tags due to their high computation power. So, keeping the focus on low-cost tags, we have proposed an ultra-lightweight RFID authentication protocol known as ULRARP + protocol that solely relies on ultra-lightweight operations like XOR, Perm and Rotation operations. Informal security evaluation indicates that the proposed protocol resists different security attacks. Also, a formal evaluation of the proposed protocol is done using GNY logic. Further, performance evaluation of the ULRARP + protocol is computed based on three parameters, i.e. Tag's computational cost, Storage space, and the message transmitted by the tag. Results indicate that our proposed ultra-lightweight protocol is more secure and performance-efficient than the existing state-of-the-art authentication protocols.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags
    Shariq, Mohd
    Singh, Karan
    Lal, Chhagan
    Conti, Mauro
    Khan, Tayyab
    [J]. COMPUTER NETWORKS, 2022, 217
  • [2] Pitfalls in an Ultra-lightweight Authentication Protocol for Low-cost RFID
    Chen, Chien-Ming
    Pan, Jeng-Shyang
    Tso, Raylin
    Huang, Szu-Wei
    Wu, Mu-En
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 634 - 637
  • [3] Ultra-Lightweight Mutual Authentication Protocol to Prevent Replay Attacks for Low-Cost RFID Tags
    Abd Alhasan, Ahmed Qasim
    Rohani, Mohd Foad
    Abu-Ali, Mohammed Sabri
    [J]. IEEE ACCESS, 2024, 12 : 50925 - 50934
  • [4] Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol
    Bilal, Zeeshan
    Masood, Ashraf
    Kausar, Firdous
    [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS, 2009, : 260 - 267
  • [5] Security Analysis of Ultra-lightweight Protocol for Low-Cost RFID Tags: SSL-MAP
    Kianersi, Mehrdad
    Gardeshi, Mahmoud
    Yousefi, Hamed
    [J]. RECENT TRENDS IN WIRELESS AND MOBILE NETWORKS, 2011, 162 : 236 - 245
  • [6] RFID Authentication Protocol for Low-cost RFID Tags
    Kang, BooJoong
    Kim, Hye Seon
    Kim, Eui-Hyung
    Kim, Hyong-Shik
    Im, Eul Gyu
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (06): : 2041 - 2060
  • [7] An authentication protocol for low-cost RFID tags
    Wei, Chia-Hui
    Hwang, Min-Shiang
    Chin, Augustin Yeh-Hao
    [J]. INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2011, 9 (02) : 208 - 223
  • [8] RFID Authentication Protocol for Low-cost Tags
    Song, Boyeon
    Mitchell, Chris J.
    [J]. WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 140 - 147
  • [9] A privacy-preserving lightweight authentication protocol for low-cost RFID tags
    Yu, Shucheng
    Ren, Kui
    Lou, Wenjing
    [J]. 2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 2939 - +
  • [10] A Validated Lightweight Authentication Protocol Towards Commercial Low-Cost RFID Tags
    Mpalane, Kealeboga
    Singano, Zothile
    Lefophane, Samuel
    [J]. PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, : 260 - 267