Object Authentication Using RFID Technology: A Multi-tag Approach

Authentication is an important requirement in various applications to restrict the non-legitimate access to certain resources. Radio Frequency Identification (RFID) technology helps to perform the authentication task. The detection probability of an object during the authentication process can be increased using multiple number of RFID tags in the object. However, many security risks such as eavesdropping, location privacy etc. are involved in this technology. This paper proposes a secure and lightweight authentication scheme assuming the objects are attached with multiple number of RFID tags. Proper analysis has been carried out to evaluate the security of the proposed scheme, including comparison with a few existing schemes in terms of computation, communication and storage requirements. Index Terms—Authentication, Detection probability, Multi-tag, RFID, Security.

[1]  Chris J. Mitchell,et al.  RFID authentication protocol for low-cost tags , 2008, WiSec '08.

[2]  Leonid Bolotnyy,et al.  Multi-tag RFID systems , 2007, Int. J. Internet Protoc. Technol..

[3]  Roberto Di Pietro,et al.  RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[4]  Hung-Yu Chien Tree-Based Matched RFID Yoking Making It More Practical and Efficient , 2009 .

[5]  Mike Burmester,et al.  Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols , 2006, 2006 Securecomm and Workshops.

[6]  Balaji Srinivasan,et al.  Design and Development of Biometrics Secure Person Detection System for E-Passport using Cryptographic Security Protocols , 2013 .

[7]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[8]  Indranil Sengupta,et al.  A New Authentication Protocol for Multi-tag RFID Applicable to Passive Tag , 2012 .

[9]  Moon-Seog Jun,et al.  Light-Weight Mutual Authentication RFD Protocol for Multi-Tags conforming to ESC Class-1 Generation-2 Standards , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.

[10]  Stefanos Gritzalis,et al.  Security analysis of the song-mitchell authentication protocol for low-cost RFID tags , 2009, IEEE Communications Letters.

[11]  Gene Tsudik A Family of Dunces: Trivial RFID Identification and Authentication Protocols , 2007, Privacy Enhancing Technologies.

[12]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[13]  Bo Sheng,et al.  Severless Search and Authentication Protocols for RFID , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[14]  Ying Wang,et al.  EMAP: An efficient mutual authentication protocol for passive RFID tags , 2012, Int. J. Autom. Comput..