Symmetric Key-Based Lightweight Authentication Protocols for RFID Security

被引:2
|
作者
Rajaguru, K. [1 ]
Hansdah, R. C. [1 ]
机构
[1] Indian Inst Sci, Dept Comp Sci & Automat, Bangalore 560012, Karnataka, India
关键词
PRIVACY; SYSTEMS;
D O I
10.1109/WAINA.2018.00133
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Radio Frequency Identification (RFID) is being used in many industries from inventory tracking to human implants. However, there are many security issues in RFID systems. Many attacks like privacy related attacks, eavesdropping, replay attack, man-in-the-middle attack, de-synchronization attack, etc. are possible in RFID systems. Due to these security problems, an adversary can get important information which can be used to track the location of a person, steal information, etc. Many researchers have proposed protocols to cater for security. However, there are several drawbacks in existing protocols. For example, they do not support both active and passive tags. In many protocols, reader is not authenticated by server. Many protocols cannot be implemented in practice due to limitations in RFID tag computing ability. This motivated us to explore new protocols which can satisfy all security requirements of authentication protocols for RFID security at low cost. In this paper, we propose a suite of lightweight authentication protocols for RFID security which provide security against all known attacks. We have compared the security provided by the proposed protocols with those of the existing protocols, and shown that the proposed protocols meet most of the security requirements of authentication protocols for RFID security. Essentially, we propose two protocols with tag anonymity as an option. The first protocol ensures all security requirements at low cost. In the second and improved protocol, communication between server and reader is greatly reduced.
引用
收藏
页码:488 / 495
页数:8
相关论文
共 50 条
  • [41] Security Analysis and Improvement on Two RFID Authentication Protocols
    Shaohui Wang
    Sujuan Liu
    Danwei Chen
    [J]. Wireless Personal Communications, 2015, 82 : 21 - 33
  • [42] Security Enhanced RFID Authentication Protocols for Healthcare Environment
    Shaohao Xie
    Fangguo Zhang
    Rong Cheng
    [J]. Wireless Personal Communications, 2021, 117 : 71 - 86
  • [43] RFID Mutual Authentication Protocols with Universally Composable Security
    Su, Chunhua
    Li, Yingjiu
    Deng, Robert H.
    [J]. RADIO FREQUENCY IDENTIFICATION SYSTEM SECURITY (RFIDSEC'11), 2011, 6 : 35 - 49
  • [44] Security Analysis and Improvement on Two RFID Authentication Protocols
    Wang, Shaohui
    Liu, Sujuan
    Chen, Danwei
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (01) : 21 - 33
  • [45] A review of authentication protocols for rfid security on smart healthcare
    Dearfian, Hanif Restu
    Amiruddin, Amiruddin
    [J]. TARUMANAGARA INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF TECHNOLOGY AND ENGINEERING, 2019, 508
  • [46] SYMMETRIC KEY BASED RFID AUTHENTICATION PROTOCOL WITH A SECURE KEY-UPDATING SCHEME
    Zhu, Guangyu
    Khan, Gul N.
    [J]. 2013 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2013, : 353 - 357
  • [47] A symmetric key-based pre-authentication protocol for secure handover in mobile WiMAX networks
    Jianhong Zhou
    Maode Ma
    Yong Feng
    Thuy Ngoc Nguyen
    [J]. The Journal of Supercomputing, 2016, 72 : 2734 - 2751
  • [48] THE KRYPTOKNIGHT FAMILY OF LIGHTWEIGHT PROTOCOLS FOR AUTHENTICATION AND KEY DISTRIBUTION
    BIRD, R
    GOPAL, I
    HERZBERG, A
    JANSON, P
    KUTTEN, S
    MOLVA, R
    YUNG, M
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 1995, 3 (01) : 31 - 41
  • [49] Security Verification for Authentication and Key Exchange Protocols
    Otat, Haruki
    Kiyomotot, Shinsaku
    Tanakat, Toshiaki
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 1 - 11
  • [50] Security Verification for Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 507 - 512