A Lightweight RFID Authentication Protocol for Mobile Reader

Special physical character and strictly limited resources in tags make RFID systems being confronted with many security problems, mobile reader brings higher design requirements for RFID protocols. In this paper, a lightweight RFID authentication protocol for mobile reader is proposed, this protocol only requires O(1) work to identify and authenticate a tag in the server and is suitable for the low-cost RFID systems. The security and performance of the proposed protocol are analyzed as well.

[1]  Chris J. Mitchell,et al.  Scalable RFID security protocols supporting tag ownership transfer , 2011, Comput. Commun..

[2]  Howon Kim,et al.  Design of an Extended Architecture for Secure Low-Cost 900MHz UHF Mobile RFID Systems , 2006, 2006 IEEE International Symposium on Consumer Electronics.

[3]  Ouyang Dantong,et al.  An Efficient Lightweight RFID Authentication Protocol for Low-cost Tags , 2011 .

[4]  T. Sejnowski,et al.  RFID authentication protocol for low-cost tags , 2001 .

[5]  Min-Shiang Hwang,et al.  A Mutual Authentication Protocol for RFID , 2011, IT Professional.

[6]  Jeeyeon Kim,et al.  Privacy threats and issues in mobile RFID , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[7]  Shang Yu,et al.  An Efficient RFID Authentication Protocol Supporting Tag Ownership Transfer , 2012 .

[8]  Tassos Dimitriou,et al.  A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[9]  Gene Tsudik,et al.  YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[10]  Zhen Zhang,et al.  A lightweight anti-desynchronization RFID authentication protocol , 2010, Inf. Syst. Frontiers.

[11]  Sang-Soo Yeo,et al.  Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value , 2011, Comput. Commun..