RFID Authentication Protocol for Low-cost Tags

被引:0
|
作者
Song, Boyeon [1 ]
Mitchell, Chris J. [1 ]
机构
[1] Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
RFID authentication protocol; security; privacy;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we investigate the possible privacy and security threats to RFID systems, and consider whether previously proposed RFID protocols address these threats. We then propose a new authentication protocol which provides the identified privacy and security features and is also efficient. The new protocol resists tag information leakage, tag location tracking, replay attacks, denial of service at, tacks, backward traceability, forward traceability (under an assumption), and server impersonation (also under all assumption). We also show that it requires less tag-side storage and computation than other similarly structured RFID protocols.
引用
收藏
页码:140 / 147
页数:8
相关论文
共 50 条
  • [1] RFID Authentication Protocol for Low-cost RFID Tags
    Kang, BooJoong
    Kim, Hye Seon
    Kim, Eui-Hyung
    Kim, Hyong-Shik
    Im, Eul Gyu
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (06): : 2041 - 2060
  • [2] An authentication protocol for low-cost RFID tags
    Wei, Chia-Hui
    Hwang, Min-Shiang
    Chin, Augustin Yeh-Hao
    [J]. INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2011, 9 (02) : 208 - 223
  • [3] An Efficient RFID Authentication Protocol for Low-cost Tags
    Liu, Yanfei
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 180 - 185
  • [4] A Novel RFID Authentication Protocol for Low-Cost Tags
    Wu, Dan
    Chen, Geng
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 43 - 46
  • [5] A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
    Abughazalah, Sarah
    Markantonakis, Konstantinos
    Mayes, Keith
    [J]. SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2013, 405 : 102 - 110
  • [6] A hidden mutual authentication protocol for low-cost RFID tags
    Li, Jung-Shian
    Liu, Kun-Hsuan
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (09) : 1196 - 1211
  • [7] Low-cost authentication protocol for passive, computation capable RFID tags
    Khan, Gul N.
    Moessner, Markus
    [J]. WIRELESS NETWORKS, 2015, 21 (02) : 565 - 580
  • [8] Low-cost authentication protocol for passive, computation capable RFID tags
    Gul N. Khan
    Markus Moessner
    [J]. Wireless Networks, 2015, 21 : 565 - 580
  • [9] A privacy-preserving lightweight authentication protocol for low-cost RFID tags
    Yu, Shucheng
    Ren, Kui
    Lou, Wenjing
    [J]. 2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 2939 - +
  • [10] An Ultra-Lightweight Secure RFID Authentication Protocol for Low-Cost Tags
    Kumar, Sanjeev
    Banka, Haider
    Kaushik, Baijnath
    Sharma, Surbhi
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024,