Design and Analysis of a Low Cost Multiple-Secret-Key RFID Security Protocol

被引:0
|
作者
Gao, Lijun [1 ,3 ]
Ma, Maode [2 ]
Shu, Yantai [3 ]
Liu, Chunfeng [3 ]
机构
[1] Shenyang Aerosp Univ, Dept Comp Sci & Technol, Shenyang, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore, Singapore
[3] Tianjin Univ, Sch Comp Sci & Technol, Tianjin, Peoples R China
关键词
RFID; Security; XOR operation on large integers; multiple solution equations;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Radio Frequency Identification (RFID) will become one of the most widely used devices in the near future. However, the major barrier that the RFID systems are facing presently is the issue of security. In this paper, we propose a low-cost multiple-secret-key RFID authentication protocol based on the XOR operation on large integers and multiple solution equations. The proposed protocol can achieve major security requirements in the deployment of the RFID systems with ability to prevent eavesdropping attacks, spoofing attacks, cloning attacks, and encryption algorithm explaining attacks.
引用
收藏
页码:914 / 917
页数:4
相关论文
共 50 条
  • [1] Design of a Security Protocol for Low-cost RFID
    Xu, Yuanzhong
    He, Zhangqing
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [2] Security and privacy on authentication protocol for low-cost RFID
    Li, Yong-Zhen
    Cho, Young-Bok
    Um, Nam-Kyoung
    Lee, Sang-Ho
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 788 - +
  • [3] Security and privacy on authentication protocol for low-cost RFID
    Li, Yong-Zhen
    Cho, Young-Bok
    Um, Nam-Kyoung
    Lee, Sang-Ho
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1101 - 1104
  • [4] Security Analysis of Low Cost RFID Systems
    Maarof, Ahmed
    Labbi, Zouheir
    Senhadji, Mohamed
    Belkasmi, Mostafa
    2014 5TH WORKSHOP ON CODES, CRYPTOGRAPHY AND COMMUNICATION SYSTEMS (WCCCS' 14), 2014, : 11 - 16
  • [5] A RFID Mutual Authentication Security Protocol Design and Analysis
    Liang, Xiaobing
    Lv, Yingjie
    Zhao, Bing
    Liu, Ying
    Sun, Zhiqiang
    Cen, Wei
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 508 - 512
  • [6] An Effective RFID Security Protocol Based on Secret Sharing
    Gao, Zhijian
    Jiang, Yi
    Lin, Zhenxiong
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 780 - 784
  • [7] Low-cost and strong-security RFID authentication protocol
    Ha, JeaCheol
    Moon, SangJae
    Nieto, Juan Manuel Gonzalez
    Boyd, Colin
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 795 - +
  • [8] Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol
    Bilal, Zeeshan
    Masood, Ashraf
    Kausar, Firdous
    2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS, 2009, : 260 - 267
  • [9] Security Analysis of the Song-Mitchell Authentication Protocol for Low-cost RFID Tags
    Rizomiliotis, Panagiotis
    Rekleitis, Evangelos
    Gritzalis, Stefanos
    IEEE COMMUNICATIONS LETTERS, 2009, 13 (04) : 274 - 276
  • [10] Double verification protocol via secret sharing for low-cost RFID tags
    Liu, Y.
    Ezerman, M. F.
    Wang, H.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 90 (118-128): : 118 - 128