Protocols for RFID tag/reader authentication

被引:81
|
作者
Piramuthu, Selwyn [1 ]
机构
[1] Univ Florida, Gainesville, FL 32611 USA
关键词
REID; light-weight cryptography; secure authentication;
D O I
10.1016/j.dss.2007.01.003
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Radio-Frequency Identification (RFID) tags are poised to supplant barcodes in the very near future. Their information storage capacity as well as their ability to transfer information through contactless means without line-of-sight translates to significant advantage over barcodes. However, cost and privacy issues are major impediments to their widespread use. We consider the latter issue, specifically those that relate to securely authenticating RFID tags and readers. Light-weight authentication protocols are necessary in RFID applications due to tag-level constraints. Over the past few years, several streams of research have emerged approaching the RFID tag/reader privacy/security problem from different perspectives. We study and evaluate a few protocols from each of those streams, identify possible vulnerabilities, and provide alternate solutions when possible. We provide security analysis of the proposed solutions. (c) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:897 / 914
页数:18
相关论文
共 50 条
  • [1] Ultralightweight RFID Reader-Tag Mutual Authentication
    Huang, Yu-Chung
    Jiang, Jehn-Ruey
    [J]. IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 613 - 616
  • [2] Using dummy data for RFID tag and reader authentication
    Alsaify, Baha A.
    Thompson, Dale R.
    Alma'aitah, Abdallah
    Di, Jia
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 8 (05) : 804 - 813
  • [3] An Efficient RFID Tag-Reader Mutual Authentication Scheme
    Zhang, Yansheng
    Li, Dancheng
    Zhu, Zhiliang
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 2942 - 2945
  • [4] Ultralightweight RFID Reader-Tag Mutual Authentication Revisited
    Huang, Yu-Chung
    Jiang, Jehn-Ruey
    [J]. 2015 IEEE THIRD INTERNATIONAL CONFERENCE ON MOBILE SERVICES MS 2015, 2015, : 166 - 173
  • [5] An analysis of RFID tag authentication protocols using secret value
    Cho, Jung-Sik
    Yeo, Sang-Soo
    Kim, Sung Kwon
    [J]. PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, MAIN CONFERENCE PAPERS, VOL 1, 2007, : 481 - 486
  • [6] Addressing the weakness in a lightweight RFID tag-reader mutual authentication scheme
    Lim, T. L.
    Li, Tieyan
    [J]. GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 59 - 63
  • [7] Hardware implementation of tag-reader mutual authentication protocol for RFID systems
    Vijaykumar, V. R.
    Elango, S.
    [J]. INTEGRATION-THE VLSI JOURNAL, 2014, 47 (01) : 123 - 129
  • [8] New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing
    Ng, Ching Yu
    Susilo, Willy
    Mu, Yi
    Safavi-Naini, Rei
    [J]. COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS, 2009, 5789 : 321 - +
  • [9] An Authentication RFID Reader with FPGA
    Li, Hui
    Hou, Yibin
    Huang, Zhangqin
    He Fugui
    Rui, Chen
    [J]. 2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 55 - 59
  • [10] The Impact of Reader to Tag Collision on RFID Tag Identification
    Zhao, Yiyang
    Hong, Weijun
    Cheung, S. C.
    Li, Shufang
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2010, 6221 : 115 - +