An efficient authentication protocol for RFID systems resistant to active attacks

被引:0
|
作者
Peris-Lopez, Pedro [1 ]
Cesar Hernandez-Castro, Julio [1 ]
Estevez-Tapiador, Juan M. [1 ]
Ribagorda, Arturo [1 ]
机构
[1] Univ Carlos III Madrid, Dept Comp Sci, E-28903 Getafe, Spain
关键词
IUC; RFID; security; active-attacks; authentication; lightweight hash functions;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RFID technology is a ubiquitous technology, and seems destined to become more a more ubiquitous. Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to security-related tasks. Despite this, there are a vast number of proposals based on the use of classical hash functions, an assumption that is not realistic (at least at the present time). Furthermore, none of the published authentication protocols are resistant to active attacks. We try to address these two issues in this work by designing a new authentication protocol, secure against passive and active attacks, inspired by Shieh et al.'s protocol for smart-cards, but adapted to RFID systems. The original Shieh et al.'s scheme is considered one of the most secure an efficient protocols in the smart-card field. Because in this protocol tags should support a hash-function on-board, a new lightweight hash function, named Tav-128, is also proposed. A preliminary security analysis is shown, as well as a study on its hardware complexity, which concludes that its implementation is possible with around 2.6K gates.
引用
收藏
页码:781 / 794
页数:14
相关论文
共 50 条
  • [21] A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems
    Poulopoulos, George
    Markantonakis, Konstantinos
    Mayes, Keith
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 706 - 711
  • [22] An Efficient Ultra lightweight Mutual Authentication Scheme for RFID Systems: Airy Protocol
    Yeh, Kuo-Hui
    Lo, N. W.
    Winata, Enrico
    JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (06): : 887 - 897
  • [23] Mutual Authentication Protocol for Networked RFID Systems
    Fernando, Harinda
    Abawajy, Jemal
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 417 - 424
  • [24] Security Enhancement of the Authentication Protocol for RFID Systems
    Lee, Yung-Cheng
    Kuo, Wen-Chung
    Hsieh, Y. -C
    Chen, T-C
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 521 - +
  • [25] Privacy and Authentication Protocol for Mobile RFID Systems
    Ben Niu
    Xiaoyan Zhu
    Haotian Chi
    Hui Li
    Wireless Personal Communications, 2014, 77 : 1713 - 1731
  • [26] Privacy and Authentication Protocol for Mobile RFID Systems
    Niu, Ben
    Zhu, Xiaoyan
    Chi, Haotian
    Li, Hui
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (03) : 1713 - 1731
  • [27] Mutual authentication protocol for mobile RFID systems
    Zhou, Jingxian
    Zhou, Yajian
    Xiao, Feng
    Niu, Xinxin
    Journal of Computational Information Systems, 2012, 8 (08): : 3261 - 3268
  • [28] An Authentication Protocol Applied to RFID Security Systems
    Gong, Xiaoqing
    Wang, Yi
    Li, Hui
    He, Jian
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 307 - +
  • [29] Efficient RFID authentication protocol for ubiquitous computing environment
    Choi, EY
    Lee, SM
    Lee, DH
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 945 - 954
  • [30] A Secure and Efficient Authentication Protocol for Passive RFID Tags
    Kolias, Constantinos
    Kolias, Vasilis
    Kambourakis, Georgios
    2009 6TH INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS (ISWCS 2009), 2009, : 36 - +