An efficient authentication protocol for RFID systems resistant to active attacks

被引:0
|
作者
Peris-Lopez, Pedro [1 ]
Cesar Hernandez-Castro, Julio [1 ]
Estevez-Tapiador, Juan M. [1 ]
Ribagorda, Arturo [1 ]
机构
[1] Univ Carlos III Madrid, Dept Comp Sci, E-28903 Getafe, Spain
关键词
IUC; RFID; security; active-attacks; authentication; lightweight hash functions;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RFID technology is a ubiquitous technology, and seems destined to become more a more ubiquitous. Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to security-related tasks. Despite this, there are a vast number of proposals based on the use of classical hash functions, an assumption that is not realistic (at least at the present time). Furthermore, none of the published authentication protocols are resistant to active attacks. We try to address these two issues in this work by designing a new authentication protocol, secure against passive and active attacks, inspired by Shieh et al.'s protocol for smart-cards, but adapted to RFID systems. The original Shieh et al.'s scheme is considered one of the most secure an efficient protocols in the smart-card field. Because in this protocol tags should support a hash-function on-board, a new lightweight hash function, named Tav-128, is also proposed. A preliminary security analysis is shown, as well as a study on its hardware complexity, which concludes that its implementation is possible with around 2.6K gates.
引用
收藏
页码:781 / 794
页数:14
相关论文
共 50 条
  • [31] An efficient RFID authentication protocol using dynamic identity
    Chiou, Shin-Yan
    International Journal of Network Security, 2019, 21 (05): : 728 - 734
  • [32] An Efficient Authentication and Key Agreement Protocol in RFID System
    Yoon, Eun-Jun
    Yoo, Kee-Young
    NETWORK AND PARALLEL COMPUTING, 2008, 5245 : 320 - +
  • [33] Attacks and improvements to chaotic map-based RFID authentication protocol
    Akgun, Mete
    Bayrak, Ali Osman
    Caglayan, Mehmet Ufuk
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4028 - 4040
  • [34] RFID Authentication Protocol Resistant to the Man-in-the-Middle Attack
    Zhai, Li
    Wu, ChuanKun
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 41 - 47
  • [35] Lightweight Protocol for Anonymity and Mutual Authentication in RFID Systems
    Rahman, Musfiq
    Sampangi, Raghav V.
    Sampalli, Srinivas
    2015 12TH ANNUAL IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2015, : 910 - 915
  • [36] XTEA based Secure Authentication Protocol for RFID Systems
    Khan, Gul N.
    Yu, Jack
    Yuan, Fei
    2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
  • [37] An Enhanced Authentication Protocol Suitable for Constrained RFID Systems
    Hosseinzadeh, Mehdi
    Servati, Mohammad Reza
    Rahmani, Amir Masoud
    Safkhani, Masoumeh
    Lansky, Jan
    Janoscova, Renata
    Ahmed, Omed Hassan
    Tanveer, Jawad
    Lee, Sang-Woong
    IEEE ACCESS, 2024, 12 : 61610 - 61628
  • [38] Scalable authentication protocol in RFID-based systems
    Ren, Xuping
    Zhang, Haiping
    Li, Yunfa
    You, Xindong
    Ren, Xuping, 1600, Transport and Telecommunication Institute, Lomonosova street 1, Riga, LV-1019, Latvia (18): : 131 - 138
  • [39] Security Analysis of a Mutual Authentication Protocol for RFID Systems
    Yang, Yuanyuan
    Lu, Zhen
    Chen, Zhuo
    Wei, Xiang
    Gu, Jian
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 252 - 255
  • [40] Improved Lightweight Mutual Authentication Protocol for RFID Systems
    Godor, Gyozo
    Antal, Matyas
    WIRELESS AND MOBILE NETWORKING, 2008, 284 : 471 - 482