Novel lightweight RFID authentication protocols for inexpensive tags

被引:5
|
作者
Khorasgani, Alireza Abdellahi [1 ]
Sajadieh, Mahdi [1 ]
Yazdani, Mohammad Rouhollah [1 ]
机构
[1] Islamic Azad Univ, Dept Elect Engn, Isfahan Khorasgan Branch, Esfahan, Iran
关键词
Ultra-Lightweight protocol; Reader impersonation; Tag tracking; De-synchronization; SECURITY; IOT; READER; ATTACK; CACHE;
D O I
10.1016/j.jisa.2022.103191
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio-frequency identification (RFID) systems represent a support technology employed for the internet of things (IoT). Since RFID systems are now used extensively, it would be a mistake to disregard security problems and user privacy protection. However, constraints on computing power and storage resources in inexpensive tags of RFID have made the execution of security issues difficult. In other words, a persistent formidable challenge to RFID security is to design ultra-lightweight authentication protocols for RFID systems in acceptable compatibility with EPC Class-1 Generation-2 standards. Xiao et al. has recently proposed an appropriate lightweight authentication protocol for inexpensive tags by benefiting from the lightweight block cipher algorithm. They have claimed that their proposed protocol is resistant to all of the known attacks which may occur in RFID systems. In this paper, we show that the LRSAS protocol is vulnerable to replay, reader impersonation, tag tracking, and desynchronization attacks. We demonstrate that the use of fixed messages in the communication between the tag and the reader is led to these attacks. To improve the LRSAS protocol, We propose three lightweight protocols LRSAS+, LRARP, and LRARP+. We analyze the security level of the proposed protocols and prove the security of the proposed design using Gong-Needham-Yahalom logic (GNY logic). We also formally confirmed the security of the proposal using the Scyther simulation tool. According to security analysis, we can observe that these protocols have a high level of security. Furthermore, the performance of the proposed protocols is analyzed. A comparison of the performance of these three protocols with similar protocols shows that these protocols are at a better level than similar protocols in terms of computational costs, storage costs, and communication costs.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Lightweight Mutual Authentication Protocols for Low Cost RFID Tags
    AlSahly, Norah
    Al-Rodhaan, Mznah
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2015, 10 (02): : 61 - 71
  • [2] On the Traceability of Tags in SUAP RFID Authentication Protocols
    Safkhani, Masoumeh
    Bagheri, Nasour
    Peris-Lopez, Pedro
    Mitrokotsa, Aikaterini
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON RFID-TECHNOLOGIES AND APPLICATIONS (RFID-TA), 2012,
  • [3] Authentication Protocols for an Object with Dynamic RFID Tags
    Piramuthu, Selwyn
    [J]. FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2018, 2018, 878 : 93 - 101
  • [4] Lightweight Anonymous Authentication Protocols for RFID Systems
    Chen, Min
    Chen, Shigang
    Fang, Yuguang
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (03) : 1475 - 1488
  • [5] LADP: A Lightweight Authentication and Delegation Protocol for RFID Tags
    Li, Gaochao
    Xu, Xiaolin
    Li, Qingshan
    [J]. 2015 SEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2015, : 860 - 865
  • [6] Survey on Prominent RFID Authentication Protocols for Passive Tags
    Baashirah, Rania
    Abuzneid, Abdelshakour
    [J]. SENSORS, 2018, 18 (10)
  • [7] Untraceable RFID Authentication Protocols for EPC Compliant Tags
    Baghery, Karim
    Abdolmaleki, Behzad
    Akhbari, Bahareh
    Aref, Mohammad Reza
    [J]. 2015 23RD IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2015, : 426 - 431
  • [8] A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-cost RFID Tags
    Bonnefoi, Pierre-Francois
    Dusart, Pierre
    Sauveron, Damien
    Akram, Raja Naeem
    Markantonakis, Konstantinos
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 612 - 620
  • [9] Security analysis of two lightweight RFID authentication protocols
    Wang Shao-hui
    Han Zhijie
    Liu Sujuan
    Chen Dan-wei
    [J]. annals of telecommunications - annales des télécommunications, 2014, 69 : 273 - 282
  • [10] Security analysis of two lightweight RFID authentication protocols
    Wang Shao-hui
    Han Zhijie
    Liu Sujuan
    Chen Dan-wei
    [J]. ANNALS OF TELECOMMUNICATIONS-ANNALES DES TELECOMMUNICATIONS, 2014, 69 (5-6): : 273 - 282